A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida +5 more
doaj +1 more source
Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET
MANET is a set of self-arranged, wirelessly connected nodes. Each mobile ad hoc network node acts as a router to send the packet from the source node to the destination node.
S. Faizal Mukthar Hussain +1 more
doaj +1 more source
Smart home devices, also known as IoT devices, provide significant convenience; however, they also present opportunities for attackers to jeopardize homeowners’ security and privacy.
Abbas Javed +5 more
doaj +1 more source
Integrated security systems for protecting payment synchronization from MITM attacks
The article addresses the challenge of securing payment synchronization against Man-in-the-Middle (MITM) attacks in multichannel payment systems, where cash, card, and online transactions are integrated with CRM and accounting platforms. It examines MITM attack scenarios and their impact on transaction integrity.
I.O. Shahmatov, I.V. Zamrii
openaire +3 more sources
Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks.
Abbas Javed +5 more
doaj +1 more source
ML-AKA: An Authentication Protocol for Non-Standalone 5G-Based C-IoT Networks
When it comes to the development of 4G and 5G technologies, long-range IoT or machine-to-machine (M2M) communication can be achieved with the help of cellular infrastructure.
Byomakesh Mahapatra +3 more
doaj +1 more source
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector ...
Qazi Waqas Khan +5 more
doaj +1 more source
A hybrid blockchain based deep learning model for multivector attack detection in internet of things enabled healthcare systems. [PDF]
Sengan S, Shieh CS, Horng MF.
europepmc +1 more source
A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source
Efficient detection of intrusions in TON-IoT dataset using hybrid feature selection approach. [PDF]
Dharini N, Janani VS, Katiravan J.
europepmc +1 more source

