Results 21 to 30 of about 1,025 (182)

Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems

open access: yesIEEE Access, 2020
This paper presents a real-time cosimulation platform with hardware-in-the-loop (HIL) for performing cyber-physical power system (CPPS) analyses based on RT-LAB and OPNET software.
Zengji Liu, Qi Wang, Yi Tang
doaj   +1 more source

Early Intrusion Detection System using honeypot for industrial control networks

open access: yesResults in Engineering, 2022
Man-in-the-Middle (MITM) and Distributed Denial of Service (DDoS) attacks are significant threats, especially to Industrial Control Systems (ICS). The honeypot is one of the most common approaches to protecting the network against such attacks.
Abbasgholi Pashaei   +3 more
doaj   +1 more source

IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol

open access: yesSecurity and Communication Networks, 2022
The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, the Signal Protocol is not resistant to Man-In-The-Middle (MITM) attacks because a malicious server can distribute the forged identity-based public keys during the user ...
Shiqi Liu, Yan Shao, Hanbo Luo, Hong Di
openaire   +1 more source

A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication

open access: yesSensors, 2020
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat   +3 more
doaj   +1 more source

A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks

open access: yesIEEE Access
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN).
Manesh Thankappan   +2 more
doaj   +1 more source

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

open access: yesSensors, 2018
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision ...
Farhan Ahmad   +4 more
doaj   +1 more source

Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

open access: yesCryptography, 2018
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability— ...
James Jin Kang   +2 more
doaj   +1 more source

Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to detect ...
Tirthankar Ghosh   +4 more
doaj   +1 more source

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy