Results 161 to 170 of about 8,344 (213)
Some of the next articles are maybe not open access.

Pilot Contamination with MITM Attack

2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017
Existing studies on the secret key generation based on physical layer wireless fading channel are largely open under active attacks. In this paper, we discuss how the man-in-the- middle (MITM) attacker, who acts as a transparent relay, attacks the training phase in wireless communication to improve the information leaked rate.
Yu Huang   +4 more
openaire   +1 more source

Generalized MitM attacks on full TWINE

Information Processing Letters, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tolba, Mohamed, Youssef, Amr M.
openaire   +1 more source

Countering MitM Attacks Using Evolved PathFinder Algorithm

International Journal of Cloud Applications and Computing, 2017
In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths.
Mouhcine Chliah   +2 more
openaire   +1 more source

Detection MITM Attack in Multi-SDN Controller

2018 IEEE 5th International Congress on Information Science and Technology (CiSt), 2018
Software Defined Security Networking is a new method to reduce risks while ensuring maximum protection for users and networks. It offers automated and usable intelligence to preserve the security of the systems. However, we have a variety of threats targeted to the plane and interface of SDN.
Anass Sebbar   +3 more
openaire   +1 more source

MITM Attacks on Bluetooth

2013
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja   +3 more
openaire   +1 more source

Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN

Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, 2021
The Neighbor Awareness Networking (NAN) specification, also known as Wi-Fi Aware, offers a quick and energy efficient way of forming wireless ad-hoc networks. It includes ranging capabilities based on Fine Timing Measurements (FTM) and can sustain connectivity to a Wi-Fi network while participating in a NAN cluster.
Lars Almon   +3 more
openaire   +1 more source

Security Analysis of MITM Attack on SCADA Network

2020
Cybersecurity is one of the major concerns in the Supervisory Control and Data Acquisition Technique (SCADA) systems. The main goal of this paper is to check how secure the power SCADA System is? In SCADA systems, attackers either disable the system or attempt to damage the SCADA network by pushing out improper data or commands for disrupting ...
Debasish Deb   +3 more
openaire   +1 more source

Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks

Journal of Information Security and Applications, 2018
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney   +2 more
openaire   +1 more source

Automation of MitM Attack on Wi-Fi Networks

2018
Security mechanisms of wireless technologies often suffer weaknesses that can be exploited to perform Man-in-the-Middle attacks, allowing to eavesdrop or to spoof network communication. This paper focuses on possibilities of automation of these types of attacks using already available tools for specific tasks.
Martin Vondráček   +2 more
openaire   +1 more source

RokuControl-Conducting MITM Attacks on Roku

2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2022
Devin Coles   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy