Wireless Security Auditing: Attack Vectors and Mitigation Strategies
نویسندگان
چکیده
منابع مشابه
Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors
This manuscript surveys a variety of topics related to the security of connected vehicles and their associated services, often referred to as telematics. Current challenges as well as emerging and future security risks are discussed. A number of specific technologies and implementations are discussed, such as Next Generation Telematics Patterns, KeeLoq, vehicular ad hoc networks, and controller...
متن کاملWind farm security: attack surface, targets, scenarios and mitigation
As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to myriad threats. This paper attempts to clarify the gaps in the understanding of wind farm threats and their implic...
متن کاملHidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation
Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an ...
متن کاملSecurity in Mobile Computing: Attack Vectors, Solutions, and Challenges
With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It c...
متن کاملCooperative Response Strategies for Large Scale Attack Mitigation
We introduce models for cooperativemitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a “friend protocol” that spreads attack reports to potentially vulnerable uninfected sites. We use mathematical models for the simplest strategies and a simulation for more complex models of mitigation. We investigate th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2017
ISSN: 1877-0509
DOI: 10.1016/j.procs.2017.09.153