Results 71 to 80 of about 8,344 (213)
Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali +4 more
wiley +1 more source
Agent‐based ARP cache poisoning detection in switched LAN environments
Address resolution protocol (ARP) cache poisoning is mostly used to perform man‐in‐the‐middle (MITM) and denial of service (DoS) attacks for sniffing and network services disruption, respectively, in switch LAN networks.
Daniyal Sakhawat +3 more
doaj +1 more source
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol ...
Bluetooth Core Bluetooth SIG. +8 more
core +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN).
Manesh Thankappan +2 more
doaj +1 more source
A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges.
Robert A. Sowah +3 more
doaj +1 more source
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication, and rogue access point attacks. The implementation of novel
Ibrahim Ghafir +5 more
doaj +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source

