Wireless Security Auditing: Attack Vectors and Mitigation Strategies

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors

This manuscript surveys a variety of topics related to the security of connected vehicles and their associated services, often referred to as telematics. Current challenges as well as emerging and future security risks are discussed. A number of specific technologies and implementations are discussed, such as Next Generation Telematics Patterns, KeeLoq, vehicular ad hoc networks, and controller...

متن کامل

Wind farm security: attack surface, targets, scenarios and mitigation

As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to myriad threats. This paper attempts to clarify the gaps in the understanding of wind farm threats and their implic...

متن کامل

Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an ...

متن کامل

Security in Mobile Computing: Attack Vectors, Solutions, and Challenges

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It c...

متن کامل

Cooperative Response Strategies for Large Scale Attack Mitigation

We introduce models for cooperativemitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a “friend protocol” that spreads attack reports to potentially vulnerable uninfected sites. We use mathematical models for the simplest strategies and a simulation for more complex models of mitigation. We investigate th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2017

ISSN: 1877-0509

DOI: 10.1016/j.procs.2017.09.153