Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabilities (WIFI)
نویسندگان
چکیده
منابع مشابه
Downgrade Attack on TrustZone
Security-critical tasks require proper isolation from untrusted software. Chip manufacturers design and include trusted execution environments (TEEs) in their processors to secure these tasks. The integrity and security of the software in the trusted environment depend on the verification process of the system. We find a form of attack that can be performed on the current implementations of the...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملA WTLS Handshake Protocol against Active Attack
WTLS as a secure protocol of WAP makes TLS that is used in wireless Internet protocol for TCP security is appropriate to wireless environments [1][2]. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of four protocols, such as Handshake, ChangeCipherSpec, Alert, Application Data. In this paper we analyze properties of Handshake protocol and procedures of est...
متن کاملExploiting Vehicles' Reputation to Mitigate DoS Attack
Recently the convergence of safety and security needs in automotive systems is one of the main challenges of the research community. However, the different nature of safety and security metrics suggests that no individual assessment technique is sufficient, in isolation, to validate large systems that are intended to be both safe and secure. The introduction of new generation ICT systems into v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering and Management Research
سال: 2018
ISSN: 2250-0758,2394-6962
DOI: 10.31033/ijemr.8.4.1