Results 71 to 80 of about 1,025 (182)

A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida   +5 more
doaj   +1 more source

Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET

open access: yesInternational Journal of Computational Intelligence Systems
MANET is a set of self-arranged, wirelessly connected nodes. Each mobile ad hoc network node acts as a router to send the packet from the source node to the destination node.
S. Faizal Mukthar Hussain   +1 more
doaj   +1 more source

Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes

open access: yesFuture Internet
Smart home devices, also known as IoT devices, provide significant convenience; however, they also present opportunities for attackers to jeopardize homeowners’ security and privacy.
Abbas Javed   +5 more
doaj   +1 more source

Integrated security systems for protecting payment synchronization from MITM attacks

open access: yesPROBLEMS IN PROGRAMMING
The article addresses the challenge of securing payment synchronization against Man-in-the-Middle (MITM) attacks in multichannel payment systems, where cash, card, and online transactions are integrated with CRM and accounting platforms. It examines MITM attack scenarios and their impact on transaction integrity.
I.O. Shahmatov, I.V. Zamrii
openaire   +3 more sources

Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security

open access: yesSensors
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks.
Abbas Javed   +5 more
doaj   +1 more source

ML-AKA: An Authentication Protocol for Non-Standalone 5G-Based C-IoT Networks

open access: yesDesigns
When it comes to the development of 4G and 5G technologies, long-range IoT or machine-to-machine (M2M) communication can be achieved with the help of cellular infrastructure.
Byomakesh Mahapatra   +3 more
doaj   +1 more source

Enhanced Abnormality Detection via PSO-Driven Adaptive Ensemble Weighting for Energy AIoT Device Security

open access: yesIEEE Access
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector ...
Qazi Waqas Khan   +5 more
doaj   +1 more source

A dataset collected in real-world industrial control systems for network attack detection. [PDF]

open access: yesSci Data
Zhou X   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy