Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks. [PDF]
Sukhni BA, Manna SK, Dave JM, Zhang L.
europepmc +1 more source
Security for the Internet of Vehicles with Integration of Sensing, Communication, Computing, and Intelligence: A Comprehensive Survey. [PDF]
He C +5 more
europepmc +1 more source
An Analysis and Simulation of Security Risks in Radar Networks from the Perspective of Cybersecurity. [PDF]
Chen R, Zhang Y, Li X, Ran J.
europepmc +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT. [PDF]
Park K, Kim M, Park Y.
europepmc +1 more source
Related searches:
Cecoin: A decentralized PKI mitigating MitM attacks
Future Generation Computer Systems, 2020Abstract For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner.
Bo Qin +5 more
openaire +1 more source
The Password Reset MitM Attack
2017 IEEE Symposium on Security and Privacy (SP), 2017We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level.
Nethanel Gelernter +3 more
openaire +1 more source
Pilot Contamination with MITM Attack
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017Existing studies on the secret key generation based on physical layer wireless fading channel are largely open under active attacks. In this paper, we discuss how the man-in-the- middle (MITM) attacker, who acts as a transparent relay, attacks the training phase in wireless communication to improve the information leaked rate.
Yu Huang +4 more
openaire +1 more source

