Filters








278 Hits in 5.9 sec

Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices

MUSTAFA KARA, MURAT FURAT
2018 Balkan Journal of Electrical and Computer Engineering  
In recent years, however, attackers are constantly developing themselves with new techniques to obtain personal information on the network.  ...  The proposed system introduced in the present study checks for any changes in our instantaneous data.  ...  The type of attack we are handling in this study is the man-in-the-middle attack (MITM).  ... 
doi:10.17694/bajece.419546 fatcat:b6h5oyotcrbhrjfn3ze5n3vtcy

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Muhammad Rizwan Ghori, Tat-Chee Wan, Gian Chand Sodhy
2020 Sensors  
Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits.  ...  Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices.  ...  • Man in the Middle (MITM) Attacks In this type of attack, a malicious node inserts itself into the communications channel between two legitimate nodes, while maintaining the facade that they are communicating  ... 
doi:10.3390/s20123590 pmid:32630381 fatcat:etgiftcnlzhvznpyrjrkpcmuze

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
Thus, it is more attractive for cyber-attacks. The IoT requires multi-dimensional security solutions such as confidentiality, integrity, and authentication services.  ...  Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information.  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, Jong Hyuk Park
2020 Journal of Information Processing Systems  
To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats  ...  Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks.  ...  Those possible attacks occur against critical infrastructure in IoT, such as denial of service (DoS), man-in-the-middle (MITM), and others [5] .  ... 
doi:10.3745/jips.03.0144 dblp:journals/jips/SicatoSRP20 fatcat:2gzefc3cd5fkjbigzk3qu2xwg4

Security Attacks on the IoT Network with 5G Wireless Communication

Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani
2021 Journal on Internet of Things  
In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.  ...  The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a  ...  The paper [37] mentioned that there are cases in which the man-in-the-middle (MITM) attack can be distinguished when there is an unjustified delay in the arrival of the packet or taking a long time to  ... 
doi:10.32604/jiot.2021.015900 fatcat:wot5xpz6rzfirood4aieabg23i

A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions

Javed Asharf, Nour Moustafa, Hasnat Khurshid, Essam Debie, Waqas Haider, Abdul Wahab
2020 Electronics  
To alleviate this challenge, there is a requirement to develop new techniques for detecting attacks initiated from compromised IoT devices.  ...  Machine and deep learning techniques are in this context the most appropriate detective control approach against attacks generated from IoT devices.  ...  This allowed the compromise of all network communications to eavesdropping and man in the middle (MiTM) attacks.  ... 
doi:10.3390/electronics9071177 fatcat:isocsvn75ja6bfqsk2wekuufyy

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: Methods, Analysis, and Future Prospects

Usman Inayat, Muhammad Fahad Zia, Sajid Mahmood, Haris M. Khalid, Mohamed Benbouzid
2022 Electronics  
attack, spoofing, and man-in-the-middle (MITM) attacks.  ...  For learning-based methods, both machine and deep learning methods are presented and analyzed in relation to the detection of cyber attacks in IoT systems.  ...  In [77] , software defined network-IoT was proposed along with a fuzzy neural network (FNN) to detect three attacks, namely, man-in-the-middle (MITM), malicious code (MC), and side-channel (SC) attacks  ... 
doi:10.3390/electronics11091502 fatcat:stweql4ru5behg2scpumznzy6i

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

Muhammad Shoaib Akhtar, Tao Feng
2022 EAI Endorsed Transactions on Security and Safety  
The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT.  ...  The objective of this paper is to rendering possible solution for various attacks on different layers of IoT architecture.  ...  Man-in-Middle Attack In environment of server client, Man-in-middle attack is generally perceived.  ... 
doi:10.4108/eetss.v8i30.590 fatcat:o3wysf4ha5f4rawekaxl4hu3he

Signature-based Intrusion Detection Hardware-Software Complex

Inna V. Stetsenko, Maksym Demydenko
2020 Information & Security An International Journal  
The majority of attacks use an Internet connection; therefore, the efforts should be directed to the way in which data packets are transmitted.  ...  The experimental results of malware detected are presented, and the security related metrics are evaluated.  ...  In this research, the complex of hardware and software is developed for the purpose of intrusion detection using signature detection and man in the middle (MITM) attack.  ... 
doi:10.11610/isij.4715 fatcat:onf4b5xftzdy7bs7hudvwyslv4

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
exchange MitM Man-in-the-Middle HKC Hybrid Key Cryptography CPA Chosen-Plaintext Attack ABE Attribute-Based Encryption DoS Denial-of-Service ECC Elliptic-Curve Cryptography SF Selective  ...  every possible key Break encryption system and gain access to ciphertext  Man-In-The-Middle (MitM) attacks: The adversary sits between two IoT devices to monitor, control, get access to private information  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets

Eric Gyamfi, Anca Jurcut
2022 Sensors  
This paper presents a comprehensive review of state-of-the-art network intrusion detection systems (NIDS) and security practices for IoT networks.  ...  Hence, these devices are vulnerable to cyber-attacks due to the lack of capacity to run existing general-purpose security software. It creates an inherent risk in IoT networks.  ...  • Man-in-the-Middle: Figure 2 shows a diagram of Man-In-the-Middle (MITM) attacks.  ... 
doi:10.3390/s22103744 pmid:35632153 pmcid:PMC9143513 fatcat:hepnt6zsfnakxlfqhchfvrt4gu

Authentication Protocols for Internet of Things: A Comprehensive Survey [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
In addition, we provide a taxonomy and comparison of authentication protocols for the IoT in form of tables in five terms, namely, network model, goals, main processes, computation complexity, and communication  ...  Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications  ...  Man-in-the-middle attack The Man-In-The-Middle (MITM) attack is one of the most well known attacks in the IoT.  ... 
arXiv:1612.07206v1 fatcat:awa32vfghnhwvdzrmjh2t2r2cm

Machine Learning Based Intelligent Intrusion Classification System for IoT Gateway Communication

2021 International journal for innovative engineering and management research  
It is essential to improve the accuracy as well speed of intrusion detection system model by applying machine learning approach to detect IoT systems and gateway network to protect from cyber-attacks.  ...  To manage these data intrusion detection system is essential technique to detect, collect analyze the data is transmission through IoT gateway network.  ...  This causeof all communication network to eavesdropping and man in middle (MiTM) attack for a certaincommunications.  ... 
doi:10.48047/ijiemr/v10/i11/01 fatcat:qmyip77njvbsrkvmrukwxreby4

Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning

Qasem Abu Al-Haija, Ahmad Al-Badawi
2021 Sensors  
In this paper, we design, implement, and evaluate the performance of machine-learning-based NIDS in IoT networks.  ...  To evaluate the developed NIDSs, we use the distilled-Kitsune-2018 and NSL-KDD datasets, both consisting of a contemporary real-world IoT network traffic subjected to different network attacks.  ...  Academy or the UAE Government.  ... 
doi:10.3390/s22010241 pmid:35009784 pmcid:PMC8749547 fatcat:fv2osu2wzjh4rfyuo67csv4kta

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats Countermeasures [article]

Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman
2020 arXiv   pre-print
Consequently, Machine Learning (ML) algorithms are used to produce accurate outputs from large complex databases, where the generated outputs can be used to predict and detect vulnerabilities in IoT-based  ...  First, we discuss and categorize various security and privacy threats reported in the past twelve years in the IoT domain.  ...  Man-in-the-middle (MiTM) attacks are one of the oldest attacks in the cyber world [121] . Spoofing and impersonation can be categorized as MiTM attacks.  ... 
arXiv:2002.03488v4 fatcat:cxavellepncexgkfcs5phdj53u
« Previous Showing results 1 — 15 out of 278 results