نتایج جستجو برای: middle mitm
تعداد نتایج: 155067 فیلتر نتایج به سال:
Although extensive research has been conducted on securing the Internet of Things (IoT) communication protocols, various vulnerabilities and exploits are continuously discovered reported. Since introduced from either insecure protocols or defectiveness applications, it is difficult to identify them during software development testing phase. In this paper, we present IoTVerif, a system that auto...
The Vehicle-to-Grid (V2G) networks are a part of the Smart Grid networks. Their primary goal is to recharge electric vehicles. These networks, as with any computer system, facing cyber attacks. For example, during charge or process, V2G can be vulnerable attacks such Man-in-the-Middle (MitM), Denial Service (DoS), identity theft, and rebound It therefore up us offer innovative solutions in orde...
Feistel structures are an extremely important and extensively researched type of cryptographic schemes. In this paper we describe improved attacks on Feistel structures with more than 4 rounds. We achieve this by a new attack that combines the main benefits of meet-in-the-middle attacks (which can reduce the time complexity by comparing only half blocks in the middle) and dissection attacks (wh...
The train Ethernet Consist Network (ECN) undertakes the task of transmitting critical control instructions. With increasing interactions between network and outside environment, masses intrusions are threatening data security railway vehicles. intrusion detection system has been proved to be an efficient method detect attacks. In this paper, a novel ensemble is proposed defense attacks against ...
Internet of Things (IoT) is a developing technology that provides the simplicity and benefits exchanging data with other devices using cloud or wireless networks. However, changes developments in IoT environment are making systems susceptible to cyber attacks which could possibly lead malicious intrusions. The impacts these intrusions physical economical damages. This article primarily focuses ...
Based on many past studies regarding Social Media Applications (SMAs) rarely focus aspects of continuous use and Perceived Privacy (PP). The increasing user awareness issue PP in using SMA is escalating due to various cybersecurity threats, such as malware, software, password Man-in-the-Middle (MitM) attacks. Accordingly, this study examines the effect users' System Quality (SQ), Information (I...
The notion of Information-Centric Networking (ICN) specifies a new communication model that emphasis on the content exchanged rather than devices connected. ICN architectures like Content Centric Network (CCN) and Named Data (NDN) have been proposed to shift from host-centric based content-centric along provide benefits users in addressing challenges traditional IP networks. It differs standard...
—In this paper, we describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید