Results 21 to 30 of about 1,025 (182)
This paper presents a real-time cosimulation platform with hardware-in-the-loop (HIL) for performing cyber-physical power system (CPPS) analyses based on RT-LAB and OPNET software.
Zengji Liu, Qi Wang, Yi Tang
doaj +1 more source
Early Intrusion Detection System using honeypot for industrial control networks
Man-in-the-Middle (MITM) and Distributed Denial of Service (DDoS) attacks are significant threats, especially to Industrial Control Systems (ICS). The honeypot is one of the most common approaches to protecting the network against such attacks.
Abbasgholi Pashaei +3 more
doaj +1 more source
IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol
The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, the Signal Protocol is not resistant to Man-In-The-Middle (MITM) attacks because a malicious server can distribute the forged identity-based public keys during the user ...
Shiqi Liu, Yan Shao, Hanbo Luo, Hong Di
openaire +1 more source
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture,
Muath Obaidat +3 more
doaj +1 more source
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN).
Manesh Thankappan +2 more
doaj +1 more source
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision ...
Farhan Ahmad +4 more
doaj +1 more source
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability— ...
James Jin Kang +2 more
doaj +1 more source
This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to detect ...
Tirthankar Ghosh +4 more
doaj +1 more source
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi +2 more
doaj +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source

