نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

Journal: :IEEE Access 2021

Although extensive research has been conducted on securing the Internet of Things (IoT) communication protocols, various vulnerabilities and exploits are continuously discovered reported. Since introduced from either insecure protocols or defectiveness applications, it is difficult to identify them during software development testing phase. In this paper, we present IoTVerif, a system that auto...

Journal: :Applied sciences 2022

The Vehicle-to-Grid (V2G) networks are a part of the Smart Grid networks. Their primary goal is to recharge electric vehicles. These networks, as with any computer system, facing cyber attacks. For example, during charge or process, V2G can be vulnerable attacks such Man-in-the-Middle (MitM), Denial Service (DoS), identity theft, and rebound It therefore up us offer innovative solutions in orde...

2015
Itai Dinur Orr Dunkelman Nathan Keller Adi Shamir

Feistel structures are an extremely important and extensively researched type of cryptographic schemes. In this paper we describe improved attacks on Feistel structures with more than 4 rounds. We achieve this by a new attack that combines the main benefits of meet-in-the-middle attacks (which can reduce the time complexity by comparing only half blocks in the middle) and dissection attacks (wh...

Journal: :IEEE Access 2021

The train Ethernet Consist Network (ECN) undertakes the task of transmitting critical control instructions. With increasing interactions between network and outside environment, masses intrusions are threatening data security railway vehicles. intrusion detection system has been proved to be an efficient method detect attacks. In this paper, a novel ensemble is proposed defense attacks against ...

Journal: :Electronics 2022

Internet of Things (IoT) is a developing technology that provides the simplicity and benefits exchanging data with other devices using cloud or wireless networks. However, changes developments in IoT environment are making systems susceptible to cyber attacks which could possibly lead malicious intrusions. The impacts these intrusions physical economical damages. This article primarily focuses ...

Journal: :Journal of Computational Innovation and Analytics (JCIA) 2023

Based on many past studies regarding Social Media Applications (SMAs) rarely focus aspects of continuous use and Perceived Privacy (PP). The increasing user awareness issue PP in using SMA is escalating due to various cybersecurity threats, such as malware, software, password Man-in-the-Middle (MitM) attacks. Accordingly, this study examines the effect users' System Quality (SQ), Information (I...

Journal: :IEEE Access 2023

The notion of Information-Centric Networking (ICN) specifies a new communication model that emphasis on the content exchanged rather than devices connected. ICN architectures like Content Centric Network (CCN) and Named Data (NDN) have been proposed to shift from host-centric based content-centric along provide benefits users in addressing challenges traditional IP networks. It differs standard...

Journal: :CoRR 2009
Stylianos Basagiannis Panagiotis Katsaros Andrew Pombortsis

—In this paper, we describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corru...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :KIPS Transactions on Computer and Communication Systems 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید