نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

Journal: :Peer-to-Peer Networking and Applications 2015
Hang Tu Neeraj Kumar Naveen K. Chilamkurti Seungmin Rho

The authenticated key agreement protocol is an important security protocol for the session initiation protocol, which allows the and the server to authenticate each other and generate a shared session key for privacy, integrity, and non-repudiation in their communications. Recently, Zhang et al. proposed a new authenticated key agreement protocol for the session initiation protocol using smart ...

2008
Xuefei Leng Keith Mayes Konstantinos Markantonakis

In this paper, we propose an enhanced version of the HB-MP authentication protocol, called the HB-MP protocol. The HB-MP protocol is a lightweight authentication protocol that is suitable for use in passive radio frequency identification (RFID) systems. The HB-MP protocol overcomes the man-in-the-middle attack to which the basic HB-MP protocol is vulnerable while maintaining its suitability to ...

2000
Wen-Guey Tzeng Zhi-Jia Tzeng

A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. In this paper we consider the distributed conference key (conference key agreement) protocol. We present two round-efficient conference key agreement protocols, which achieve the optimum in terms of the number of roun...

2014
Motahareh Dehghan Babak Sadeghiyan

In this paper, we design and implement a new Plugin to Honeyd which generates attack signature, automatically. Current network intrusion detection systems work on misuse detectors, where the packets in the monitored network are compared against a repository of signatures. But, we focus on automatic signature generation from malicious network traffic. Our proposed system inspects honeypot traffi...

2013
Akhil Behl

Today with the Internet available as a general tool, access to any publicly reachable network is a way for the legit users to leverage network resources. On the other hand, it is a way for hackers and attackers to exploit a network whether it is for competitive, financial, revenge or for that matter any malicious purpose. Intrusion prevention is a key component of any security strategy in today...

Journal: :Computers & Security 2017
Hatem Ismail Daniel Germanus Neeraj Suri

Peer-to-Peer (P2P) protocols underlie multiple networked applications given that the P2P decentralized design inherently fosters scalability and robustness. While distributiveness and scalability are attractive features, these facets also increase exposure to malicious peers which can propagate malicious routing information. Accordingly, a diverse set of continuously evolving attacks can be mou...

Journal: :CoRR 2017
Amir Javed Pete Burnap Omer F. Rana

The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack usin...

2016
S V N VAMSIDHAR S RAMA CHANDRA

Remote Sensor Network is extensively used as a part of various application ranges. These centers assemble data from various sensor center points. There are various promising attacks like provenance impersonation, Packet drop ambush, DDos strike, Jamming strike thus on are found in the WSN while transmitting the data. A pernicious adversary may show additional center points in the framework or e...

Journal: :IEEE internet of things magazine 2022

Internet of Things devices have become the new privileged targets for cyberattackers in recent years. This is part due to amount sensitive data they provide. In parallel, security systems are becoming more and robust with help machine learning (ML) algorithms. However, this advance can also benefit malicious people. years, ML-based smart attacks emerged significantly changing threat landscape. ...

2014
K.ARUN PRASAD SWETHA MURALI

Password-authenticated key exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. The main aim of this project is to authenticate a client, in the scenario where two Peer servers co-operate for Authentication and if one server is compromised, the attacker still cannot pretend to be the cl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید