Results 141 to 150 of about 1,025 (182)
Some of the next articles are maybe not open access.
Location Consistency-Based MITM Attack Detection in 802.11ad Networks
2019IEEE 802.11ad-enabled millimeter-wave communication systems are becoming a key enabler for bandwidth-intensive and delay-sensitive indoor applications, due to their potentials to provision multiple-Gigabytes. However, the weak built-in security scheme renders them vulnerable to various cyber-physical attacks, such as beam-stealing and man-in-the-middle
Xianglin Wei, Chaogang Tang
openaire +1 more source
Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks
IEEE Internet of Things Journal, 2017While the Internet of Things (IoT) is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that software-defined networking (SDN) has a great capability in automatically and dynamically managing network flows.
Cheng Li, Zhengrui Qin, Ed Novak, Qun Li
openaire +1 more source
New secure routing method & applications facing MitM attacks
2014 International Conference on Next Generation Networks and Services (NGNS), 2014In real life we have one entry for multiple tasks, like police officer job that can vary from regulating traffic to other duties like keeping the peace, law enforcement, protection of people and property, etc. By applying the same concept on routers, we developed in this paper-using Graph Theory — a new routing method that adds the task of security ...
Mouhcine Chliah +2 more
openaire +1 more source
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
Journal of Medical Systems, 2019Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal.
Muhammad, Yaseen +6 more
openaire +2 more sources
Detection of MITM attack in LAN environment using payload matching
2015 IEEE International Conference on Industrial Technology (ICIT), 2015Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the attacker's machine. Most existing schemes for discovering MITM attack focus on detecting the mechanism used to direct the traffic through the attacker machine.
openaire +1 more source
MitM Attacks and IoT Security: A Case Study on MQTT
2023The number of devices connected to the Internet has increased with the development of Internet of Things (IoT) technologies. It is foreseen that this situation will increase daily, and the concept of the IoT will become more popular. However, security vulnerabilities in IoT devices have not been eliminated, and these devices are vulnerable to attacks ...
ÇELİK, Serhat +2 more
openaire +1 more source
MitM attack: CCMP data-confidentiality targeting Wi-Fi
Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023), 2023Zhaoyang Wang +5 more
openaire +1 more source
Man-in-the-Middle (MitM) Attacks: Techniques and defenses
World Journal of Advanced Engineering Technology and SciencesMitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial.
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
2013This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we here look for the existence
Canteaut, Anne +2 more
openaire +1 more source

