Results 171 to 180 of about 8,344 (213)
Some of the next articles are maybe not open access.

Vulnerability analysis on Mobile VoIP supplementary services and MITM attack

2013 International Computer Science and Engineering Conference (ICSEC), 2013
Mobile VoIP(mVoIP) is to provide Voice based telephony service using wired/wireless network on Smartphone. We can use several kinds of mVoIP services on smartphone such as the Supplementary Service registration / release process, coloring, call forwarding, absence guide, three-way calling, and simultaneous receipt.
You Joung Ham, Hyung-Woo Lee
openaire   +1 more source

Location Consistency-Based MITM Attack Detection in 802.11ad Networks

2019
IEEE 802.11ad-enabled millimeter-wave communication systems are becoming a key enabler for bandwidth-intensive and delay-sensitive indoor applications, due to their potentials to provision multiple-Gigabytes. However, the weak built-in security scheme renders them vulnerable to various cyber-physical attacks, such as beam-stealing and man-in-the-middle
Xianglin Wei, Chaogang Tang
openaire   +1 more source

Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks

IEEE Internet of Things Journal, 2017
While the Internet of Things (IoT) is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that software-defined networking (SDN) has a great capability in automatically and dynamically managing network flows.
Cheng Li, Zhengrui Qin, Ed Novak, Qun Li
openaire   +1 more source

New secure routing method & applications facing MitM attacks

2014 International Conference on Next Generation Networks and Services (NGNS), 2014
In real life we have one entry for multiple tasks, like police officer job that can vary from regulating traffic to other duties like keeping the peace, law enforcement, protection of people and property, etc. By applying the same concept on routers, we developed in this paper-using Graph Theory — a new routing method that adds the task of security ...
Mouhcine Chliah   +2 more
openaire   +1 more source

MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems

Journal of Medical Systems, 2019
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal.
Muhammad, Yaseen   +6 more
openaire   +2 more sources

Detection of MITM attack in LAN environment using payload matching

2015 IEEE International Conference on Industrial Technology (ICIT), 2015
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the attacker's machine. Most existing schemes for discovering MITM attack focus on detecting the mechanism used to direct the traffic through the attacker machine.
openaire   +1 more source

MitM Attacks and IoT Security: A Case Study on MQTT

2023
The number of devices connected to the Internet has increased with the development of Internet of Things (IoT) technologies. It is foreseen that this situation will increase daily, and the concept of the IoT will become more popular. However, security vulnerabilities in IoT devices have not been eliminated, and these devices are vulnerable to attacks ...
ÇELİK, Serhat   +2 more
openaire   +1 more source

MitM attack: CCMP data-confidentiality targeting Wi-Fi

Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023), 2023
Zhaoyang Wang   +5 more
openaire   +1 more source

Man-in-the-Middle (MitM) Attacks: Techniques and defenses

World Journal of Advanced Engineering Technology and Sciences
MitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial.
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Home - About - Disclaimer - Privacy