نتایج جستجو برای: mitm attack
تعداد نتایج: 80860 فیلتر نتایج به سال:
It has been publicly known that keyboards and mice, either wired or wireless, can be potentially attacked by eavesdropping or hijacking. Although there are many secure keyboards and some secure mice in the market, there are still vulnerabilities under different types of Man-In-The-Middle (MITM) attacks such as hijack or replay. Usually these attacks are low cost and easy to implement, but so fa...
This paper presents the first wireless pairing protocol that works in-band, with no pre-shared keys, and protects against MITM attacks. The main innovation is a new key exchange message constructed in a manner that ensures an adversary can neither hide the fact that a message was transmitted, nor alter its payload without being detected. Thus, any attempt by an adversary to interfere with the k...
We present the new NTRUEncrypt parameter generation algorithm, which is designed to be secure in light of recent attacks that combine lattice reduction and meet-in-the-middle (MITM) techniques. The parameters generated from our algorithm have been submitted to several standard bodies and are presented at the end of the paper.
This paper presents a new generic technique, named sievein-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. C...
Man in the middle attacks involve the interception and retransmission of electronic messages in a way that the original parties will presume that their communication is secure. Such an attack could be a threat to any electronic voting scenario. This paper proposes a novel method for preventing this kind of attacks by including in the transaction a challenge-response test. The human end-user is ...
Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of network (close to Internet Things (IoT) devices). provide services in lieu cloud. Thus, improving performance and making it attractive social media-based systems. Security issues one most challenges encountered FC. In this paper, we propose an anomaly-based Intrusion Detection Prevent...
Keamanan data telah menjadi ancaman yang paling sensitive dan sering terjadi ditengah meningkatnya trafik cukup massif dalam jaringan internet. Untuk menjaga keamanan ada berbagai metode di usulkan diataranya dengan kriptografi. Kriptografi merupakan teknik matematika untuk menyandikan informasi (plaintext) ke bentuk tidak bisa baca atau dipahami (ciphertext) disebut proses enkripsi. kunci sime...
The rapid development of Internet Things (IoT) technology, together with mobile network has created a never-before-seen world interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight against malicious misuse networks, in this paper we propose novel algorithm called AMDES (unmanned aerial system multifractal analysis intrusion detection system) ...
Solar power (SP) passive optical network (PON)-based fiber-wireless (FiWi) access systems are becoming increasingly popular as they provide coverage to rural and urban areas where no grid exists. Secure operation of such networks which includes solar- and/or battery-powered devices, is crucial for anticipating potential issues prolong the life operation. Since units (ONUs) may be powered by SP-...
Attacks have been targeting secure socket layer (SSL) from the time it was created especially because of its utmost importance in securing Web transactions. These attacks are either attacks exploiting vulnerabilities in the SSL protocol itself, or attacks exploiting vulnerabilities in the services that SSL uses, such as certificates and web browsers. While the attacks on SSL itself have been su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید