To see the other types of publications on this topic, follow the link: De-Authentication Attack.

Journal articles on the topic 'De-Authentication Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 journal articles for your research on the topic 'De-Authentication Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Salman Al-Nuaimi, Mustafa Abdulkareem, and Abdullahi Abdu Ibrahim. "Analyzing and Detecting the De-Authentication Attack by Creating an Automated Scanner using Scapy." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (2023): 131–37. http://dx.doi.org/10.17762/ijritcc.v11i2.6137.

Full text
Abstract:
with the rapid spread of internet technologies around the world, the number of people that are using the internet is increasing enormously in the last 10 years. with the increase in the number of people that are using the internet and the increase in the devices that depend on the internet such as computers, tablets, and mobile phones are raised the challenges of internet security against hackers who can steal sensitive information and exploits personal data. In this paper, we’re focusing on the home security threads and one of its famous attacks called the De-authentication attacks. The de-au
APA, Harvard, Vancouver, ISO, and other styles
2

Gebresilassie, Samson Kahsay, Joseph Rafferty, Liming Chen, Zhan Cui, and Mamun Abu-Tair. "Transfer and CNN-Based De-Authentication (Disassociation) DoS Attack Detection in IoT Wi-Fi Networks." Electronics 12, no. 17 (2023): 3731. http://dx.doi.org/10.3390/electronics12173731.

Full text
Abstract:
The Internet of Things (IoT) is a network of billions of interconnected devices embedded with sensors, software, and communication technologies. Wi-Fi is one of the main wireless communication technologies essential for establishing connections and facilitating communication in IoT environments. However, IoT networks are facing major security challenges due to various vulnerabilities, including de-authentication and disassociation DoS attacks that exploit IoT Wi-Fi network vulnerabilities. Traditional intrusion detection systems (IDSs) improved their cyberattack detection capabilities by adapt
APA, Harvard, Vancouver, ISO, and other styles
3

Safkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (2018): 82. http://dx.doi.org/10.3390/fi10090082.

Full text
Abstract:
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweig
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Rajinder, and Satish Kumar. "A Light Weight Solution for Detecting De-Authentication Attack." International Journal of Network Security & Its Applications 11, no. 01 (2019): 15–26. http://dx.doi.org/10.5121/ijnsa.2019.11102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ji, Sai, Shuai Liu, Chen Wang, Rongxin Qi, and Jian Shen. "An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System." Electronics 9, no. 12 (2020): 2167. http://dx.doi.org/10.3390/electronics9122167.

Full text
Abstract:
In traditional transportation, each driver usually relies on their experience to determine an appropriate route, which may shorten the driving time and transport cost. However, this may also lead to a waste of time in traffic jams or due to other problems. In recent years, by introducing Internet of Things technology into the transportation system, traffic condition data can be collected and analyzed in real-time, which makes it easier for drivers to choose appropriate routes. However, the transmitted data may be intercepted or falsified, especially in untrusted public communication channels.
APA, Harvard, Vancouver, ISO, and other styles
6

Servati, Mohammad Reza, Masoumeh Safkhani, Saqib Ali, et al. "Cryptanalysis of Two Recent Ultra-Lightweight Authentication Protocols." Mathematics 10, no. 23 (2022): 4611. http://dx.doi.org/10.3390/math10234611.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices’ numerous limitations (such as memory space, computing capability, and battery capacity) make it difficult to implement cost- and energy-efficient security solutions. As a result, several researchers attempted to address this problem, and several RFID-based security mechanisms for the MIoT and other constrained environments were proposed. In this vein, Wang et al. and Shariq et al. recently proposed CRUSAP an
APA, Harvard, Vancouver, ISO, and other styles
7

Sooyeon Shin, Jongshin Kim, and Taekyoung Kwon. "Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 86–92. http://dx.doi.org/10.56801/rebicte.v5i.87.

Full text
Abstract:
In wireless sensor networks, sensor nodes collect different types of data from the environment andnot all collected data has the same security importance. Basically, for real-time applications, user authenticationto ensure that only authorized users can access sensor nodes is critical, but access controlthat allows users with different privileges to access data according to their privileges is also important.Recently, Adavoudi-Jolfaei et al. proposed an improved three-factor authentication scheme byproviding more desired security properties such as three-factor authentication and access contro
APA, Harvard, Vancouver, ISO, and other styles
8

Arisandi, Diki, Nazrul M. Ahmad, and Subarmaniam Kannan. "Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)." Emerging Science Journal 9, no. 1 (2025): 284–310. https://doi.org/10.28991/esj-2025-09-01-016.

Full text
Abstract:
Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. To address this issue, this research has proposed an innovative mechanism called Invisible Scout, which uses a multi-module system to identify RAPs. This study aimed to develop and validate a mechanism capable of accurately detecting RAPs in controlled setups, real-world environments, and under de-authentication attack scenarios. The proposed system consists of four key modules: sniffer, detection, probing, and comparison. To evaluate its effectivene
APA, Harvard, Vancouver, ISO, and other styles
9

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.

Full text
Abstract:
The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain a
APA, Harvard, Vancouver, ISO, and other styles
10

Nyangaresi, Vincent Omollo, Silvance O. Abeka, and Anthony J. Rodrigues. "GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE Handovers." International Journal of Cyber-Security and Digital Forensics 9, no. 1 (2020): 1–11. http://dx.doi.org/10.17781/p002642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ballesteros, Juan. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (2016): 57. http://dx.doi.org/10.21754/tecnia-26012016.06.

Full text
Abstract:
RESUMENEn este documento se presenta una auditoria en redes bajo funcionamiento en protocolo IEEE 802.11xx, redesutilizadas para la comunicación entre dispositivos en casa y oficina para verificar la seguridad que garantizan lasmismas; para este propósito se utilizó software libre que funciona bajo sistema operativo Linux, específicamentela suite de Aircrack; se presenta la auditoria a las redes que funcionan con encriptación WEP y WPA, populares yutilizadas en redes inalámbricas de este tipo; de manera transversal se muestran los diferentes tipos de ataquesdisponibles por mencionar sniffers,
APA, Harvard, Vancouver, ISO, and other styles
12

Ballesteros, Juan, and Fabián Chaparro. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (2016): 57. http://dx.doi.org/10.21754/tecnia.v26i1.7.

Full text
Abstract:
RESUMENEn este documento se presenta una auditoria en redes bajo funcionamiento en protocolo IEEE 802.11xx, redesutilizadas para la comunicación entre dispositivos en casa y oficina para verificar la seguridad que garantizan lasmismas; para este propósito se utilizó software libre que funciona bajo sistema operativo Linux, específicamentela suite de Aircrack; se presenta la auditoria a las redes que funcionan con encriptación WEP y WPA, populares yutilizadas en redes inalámbricas de este tipo; de manera transversal se muestran los diferentes tipos de ataquesdisponibles por mencionar sniffers,
APA, Harvard, Vancouver, ISO, and other styles
13

Kumar, Anand, Dharmesh Dhabliya, Pankaj Agarwal, et al. "Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/8803586.

Full text
Abstract:
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad range of things and many types of communication technologies to share information. This new age of communication will be characterised by the following characteristics: Because all of the IoT’s objects are connected to one another and because they function in environments that are not protected, it poses a significantly greater number of issues, constraints, and challenges than do traditional computing systems. This is due to the fact that traditional computing systems do not have as many interconnected c
APA, Harvard, Vancouver, ISO, and other styles
14

Ms., Dilna e. p1 Ms. Maneesha Manoj2 Ms. Jiji c. j3 Ms. Jeena c. j. 4. Ms. Hrudhya k. p5. "FAKE FACE IDENTIFICATION." International Journal of Advances in Engineering & Scientific Research, ISSN: 2349 –3607 (Online) , ISSN: 2349 –4824 (Print) Vol.4,, Issue 1, Jan-2017, (2017): pp 40–48. https://doi.org/10.5281/zenodo.242479.

Full text
Abstract:
<strong>Abstract: </strong> <strong>Objective-</strong> Automatic face recognition is now widely used in applications ranging from de-duplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person’s face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose an efficient a
APA, Harvard, Vancouver, ISO, and other styles
15

Ms., Dilna e. p1, Maneesha Manoj2 Ms., Jiji c. j3 Ms., Jeena c. j. Ms., and Hrudhya k. p5 Ms. "FAKE FACE IDENTIFICATION." International Journal of Advances in Engineering & Scientific Research 4, no. 1 (2017): 40–48. https://doi.org/10.5281/zenodo.10774726.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <strong>Objective-</strong> Automatic face recognition is now widely used in applications ranging from de-duplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person&rsquo;s face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose a
APA, Harvard, Vancouver, ISO, and other styles
16

Abdallah, Abdallah Elhigazi, Mosab Hamdan, Mohammed S. M. Gismalla, et al. "Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network." Sensors 23, no. 5 (2023): 2663. http://dx.doi.org/10.3390/s23052663.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service (DoS) attacks. In this study, management-frames-based DoS attacks, in which the attacker floods the network with management frames, are particularly concerning as they can cause widespread disruptions in the network. Attacks known as denial of service (DoS) can target wireless LANs. None of the wireless security m
APA, Harvard, Vancouver, ISO, and other styles
17

Adeyeye Oshin, Michael, Matthew Olusegun Ojewale, Oluyomi Olufemi Kabiawu, Romana Challans, and Kauna Mufeti. "Improving Remote Method Invocation via Method Authorization and Elimination of Registry: An Exploration of Java and Haxe." International Journal of Information, Communication Technology and Applications 1, no. 1 (2015): 152–79. http://dx.doi.org/10.17972/ijicta20151116.

Full text
Abstract:
Service availability in Java RMI (Remote Method Invocation) implementations can easily be compromised in a number of ways. One of the ways is when an attacker controls a directory service and mounts an attack on a RMI client and data. Stubs in a registry can be de- registered or overwritten by the attacker. In addition, he could register his own stubs as proxies to a server implementation. This project focuses on the security pitfalls of using default RMI implementation, namely the lack of access control mechanism to manage server methods (and objects) and limitations of RMI registry. The RMI
APA, Harvard, Vancouver, ISO, and other styles
18

Abhisek, Hazra, Maity Shuvajit, Pal Barnali, and Bandyopadhyay Asok. "Adversarial attacks in signature verification: a deep learning approach." Computer Science and Information Technologies 5, no. 3 (2024): 215–26. https://doi.org/10.11591/csit.v5i3.pp215-226.

Full text
Abstract:
Handwritten signature recognition in forensic science is crucial for identity and document authentication. While serving as a legal representation of a person&rsquo;s agreement or consent to the contents of a document, handwritten signatures de termine the authenticity of a document, identify forgeries, pinpoint the suspects and support other pieces of evidence like ink or document analysis. This work focuses on developing and evaluating a handwritten signature verification sys tem using a convolutional neural network (CNN) and emphasising the model&rsquo;s efficacy using hand-crafted adversar
APA, Harvard, Vancouver, ISO, and other styles
19

Pohoretskyi, M. A. "The Criminal Procedure Code of Ukraine under martial law: novelties, effectiveness and challenges to human rights." Analytical and Comparative Jurisprudence 3, no. 3 (2025): 142–54. https://doi.org/10.24144/2788-6018.2025.03.3.22.

Full text
Abstract:
It is indicated that the large-scale military attack by the Russian Federation became a powerful incentive for the urgent update of the Criminal Procedure Code of Ukraine (CPC). Already on April 14, 2022, Law No. 2201-IX was adopted, which supplemented the CPC with a special section IX-¹, including the important article 615. This innovation enabled reserve judicial bodies to extend preventive measures and conduct court hearings in a remote format in cases where traditional courts were destroyed or relocated as a result of hostilities. The article puts forward a comprehensive procedural model f
APA, Harvard, Vancouver, ISO, and other styles
20

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Full text
Abstract:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Anuj Kumar, Arun Solanki, Anand Nayyar, and Basit Qureshi. "Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards." Applied Sciences 10, no. 22 (2020): 8291. http://dx.doi.org/10.3390/app10228291.

Full text
Abstract:
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward
APA, Harvard, Vancouver, ISO, and other styles
22

Yuk, Hyeong-Jun, and Kang-Bin Yim. "Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks." Journal of Korea Navigation Institute 17, no. 1 (2013): 24–32. http://dx.doi.org/10.12673/jkoni.2013.17.01.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gulab Gaikwad, Adwait, and Balaji Patil. "Securing the Airwaves: A Survey on De-authentication Attacks and Mitigation Strategies." International Journal of Computing and Digital Systems 15, no. 1 (2024): 1307–16. http://dx.doi.org/10.12785/ijcds/160196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Aghili, Seyed, Hamid Mala, and Pedro Peris-Lopez. "Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol." Sensors 18, no. 11 (2018): 3663. http://dx.doi.org/10.3390/s18113663.

Full text
Abstract:
Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-efficient authentication protocols is a very important issue in wireless sensor network security. Recently, Amin et al. presented an untraceable and anonymous three-factor authentication (3FA) scheme for HWSNs and argued that their protocol is efficient and can withstand the common security threats i
APA, Harvard, Vancouver, ISO, and other styles
25

Dimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, and Christos Douligeris. "Automated Wi-Fi intrusion detection tool on 802.11 networks." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 88–103. http://dx.doi.org/10.52953/lhxo3338.

Full text
Abstract:
Wi-Fi networks enable user-friendly network connectivity in various environments, ranging from home to enterprise networks. However, vulnerabilities in Wi-Fi implementations may allow nearby adversaries to gain an initial foothold into a network, e.g., in order to attempt further network penetration. In this paper we propose a methodology for the detection of attacks originating from Wi-Fi networks, along with a Wi-Fi Network Intrusion Detection (Wi-Fi-NID) tool, developed to automate the detection of such attacks at 802.11 networks. In particular, Wi-Fi-NID has the ability to detect and trace
APA, Harvard, Vancouver, ISO, and other styles
26

Aghili, Seyed Farhad, Maede Ashouri-Talouki, and Hamid Mala. "DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT." Journal of Supercomputing 74, no. 1 (2017): 509–25. http://dx.doi.org/10.1007/s11227-017-2139-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kumar S, Vignesh. "A Survey of 802.1X: Securing Network Access in the Modern Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35325.

Full text
Abstract:
The advent of wireless and wired net- works has revolutionized the way we communicate and access information, yet it has also introduced new secu- rity challenges. Among the various pro- tocols designed to mitigate these chal- lenges, 802.1X stands out as a corner- stone for securing network access. This paper presents a comprehensive sur- vey of the 802.1X protocol, focusing on its role in modern networking, the types of Extensible Authentication Proto- col (EAP) methods it supports, and the security vulnerabilities and mitigation strategies associated with its implemen- tation. Through an ex
APA, Harvard, Vancouver, ISO, and other styles
28

Farooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (2019): 2536. http://dx.doi.org/10.3390/en12132536.

Full text
Abstract:
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability. Generic Object-Oriented Substation Event (GOOSE) and Sample Value (SV) messages developed according to IEC 61850 enable efficient monitoring and operation control of SAS. IEC 61850 is very popular due to its flexible and robust modeling. As the number of critical infrastructures that employed IEC 61850 increases, it is important to study cybersecur
APA, Harvard, Vancouver, ISO, and other styles
29

Hazra, Abhisek, Shuvajit Maity, Barnali Pal, and Asok Bandyopadhyay. "Adversarial attacks in signature verification: a deep learning approach." Computer Science and Information Technologies 5, no. 3 (2024): 215–26. http://dx.doi.org/10.11591/csit.v5i3.p215-226.

Full text
Abstract:
Handwritten signature recognition in forensic science is crucial for identity and document authentication. While serving as a legal representation of a person’s agreement or consent to the contents of a document, handwritten signatures de termine the authenticity of a document, identify forgeries, pinpoint the suspects and support other pieces of evidence like ink or document analysis. This work focuses on developing and evaluating a handwritten signature verification sys tem using a convolutional neural network (CNN) and emphasising the model’s efficacy using hand-crafted adversarial attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Tewari, Aakanksha, and Brij B. Gupta. "Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags." International Journal on Semantic Web and Information Systems 16, no. 3 (2020): 20–34. http://dx.doi.org/10.4018/ijswis.2020070102.

Full text
Abstract:
Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic m
APA, Harvard, Vancouver, ISO, and other styles
31

Nath, Seema, Subhranil Som, and Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (2021): 139–47. http://dx.doi.org/10.3233/kes-210059.

Full text
Abstract:
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented. The major contribution in this work is key generation and authentication, for key generation the “advanced encryption standard algorithm” is developed, in which the new and old keys are generated. The encryption is done under the source side, and decrypt
APA, Harvard, Vancouver, ISO, and other styles
32

Abduljabbar, Zaid Ameen, Vincent Omollo Nyangaresi, Hend Muslim Jasim, et al. "Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture." Sustainability 15, no. 13 (2023): 10264. http://dx.doi.org/10.3390/su151310264.

Full text
Abstract:
Precision agriculture encompasses automation and application of a wide range of information technology devices to improve farm output. In this environment, smart devices collect and exchange a massive number of messages with other devices and servers over public channels. Consequently, smart farming is exposed to diverse attacks, which can have serious consequences since the sensed data are normally processed to help determine the agricultural field status and facilitate decision-making. Although a myriad of security schemes has been presented in the literature to curb these challenges, they e
APA, Harvard, Vancouver, ISO, and other styles
33

Javed, Sana, Muhammad Asghar Khan, Ako Muhammad Abdullah, et al. "An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones." Drones 6, no. 10 (2022): 264. http://dx.doi.org/10.3390/drones6100264.

Full text
Abstract:
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an unencrypted wireless link and have little computational capability in a typical IoD environment, making them exposed to a wide range of cyber-attacks. Security vulnerabilities in IoD systems include man-in-the-middle attacks, impersonation, credential leaking, GPS spoofing, and drone hijacking. To avoid the occurrence
APA, Harvard, Vancouver, ISO, and other styles
34

Gulyás, Gábor György. "Gépi tanulási módszerek alkalmazása deanonimizálásra." Információs Társadalom 17, no. 1 (2017): 72. http://dx.doi.org/10.22503/inftars.xvii.2017.1.5.

Full text
Abstract:
Számos olyan adathalmaz áll a rendelkezésünkre, amelyek jelentős üzleti és kutatási potenciált hordoznak. Azonban – gondoljunk például a hordozható eszközök által gyűjtött egészségügyi adatokra – a hasznosítás mellett kiemelkedő kockázati tényező a privátszféra sérülése, amelynek elkerülésére többek között anonimizálási algoritmusokat alkalmaznak. Jelen tanulmányban az anonimizálás „visszafordítására” szakosodott algoritmusokat, az úgynevezett deanonimizációs eljárásokat, illetve azoknak egy speciális és újnak tekinthető szegmensét tekintjük át, amelyeknél gépi tanulási eljárásokat alkalmaznak
APA, Harvard, Vancouver, ISO, and other styles
35

Kovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.

Full text
Abstract:
The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The cre
APA, Harvard, Vancouver, ISO, and other styles
36

Zubarev, Sergey M., Alexander V. Travin, and Aleksey I. Frolov. "TORT LIABILITY IN MAKING AND IMPLEMENTING PUBLIC MANAGEMENT DECISIONS USING DIGITAL INFORMATION SYSTEMS." Vestnik Tomskogo gosudarstvennogo universiteta. Pravo, no. 38 (2020): 121–35. http://dx.doi.org/10.17223/22253513/38/12.

Full text
Abstract:
The article provides a legal analysis of the conditions of civil liability for damage caused by the adoption and implementation of state management decisions taken during the operation of digital state information systems. An approach to assessing the guilt of the state in taking a harmful management decision in the context of digitalization, consisting in the analysis of the actions of the entire state appa-ratus as a whole, rather than a single individual body that failed, for example, to resist com-puter attacks, is proposed. The features of tort liability of the state for breach of confide
APA, Harvard, Vancouver, ISO, and other styles
37

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

"Detection and Prevention of De-authentication Attack in Real-time Scenario." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (2019): 3324–30. http://dx.doi.org/10.35940/ijitee.j1217.0881019.

Full text
Abstract:
Wireless Local Area Network (WLAN) is an infrastructure network in which nodes are connected to a centralized system to provide Internet access to mobile users by radio waves. But WLANs are vulnerable to Medium Access Control (MAC) layer Denial of Service (DoS) attacks due to the susceptibility of the management frames. An attacker can spoof the MAC address of the legitimate client and perform de-authentication attack to disconnect WLANs users from the access point. Many free tools are available in Kali Linux Operating System (OS) by which this attack can be performed and cause a security thre
APA, Harvard, Vancouver, ISO, and other styles
39

Rajinder, Singh, and Kumar Satish. "A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK." January 31, 2019. https://doi.org/10.5121/ijnsa.2019.11102.

Full text
Abstract:
Nowadays Wireless local area networks (WLANs) are growing very rapidly. Due to the popularity of 802.11 networks, possibilities of various attacks to the wireless network have also increased. In this paper, a special type of attack De-Authentication/disassociation attack has been investigated. In a normal scenario, a wireless client or user sends a de-authentication frame when it wants to terminate the connection. These frames are in plain text and are not encrypted. These are not authenticated by the access point. Attackers take advantage of this, and spoof these packets and disable the commu
APA, Harvard, Vancouver, ISO, and other styles
40

Nyangaresi, Vincent Omollo, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, et al. "Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-67064-z.

Full text
Abstract:
AbstractAdvancements in cloud computing, flying ad-hoc networks, wireless sensor networks, artificial intelligence, big data, 5th generation mobile network and internet of things have led to the development of smart cities. Owing to their massive interconnectedness, high volumes of data are collected and exchanged over the public internet. Therefore, the exchanged messages are susceptible to numerous security and privacy threats across these open public channels. Although many security techniques have been designed to address this issue, most of them are still vulnerable to attacks while some
APA, Harvard, Vancouver, ISO, and other styles
41

Neelakantan, N. Pratik, and C. Nagesh. "Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks." International Journal of Smart Sensor and Adhoc Network., October 2011, 98–101. http://dx.doi.org/10.47893/ijssan.2011.1030.

Full text
Abstract:
Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as de authentication attacks or MAC layer DoS attack. I
APA, Harvard, Vancouver, ISO, and other styles
42

"Mitigating the Threat due to Data Deduplication Attacks in Cloud Migration using User Layer Authentication with Light Weight Cryptography." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (2020): 2539–45. http://dx.doi.org/10.35940/ijitee.c8463.019320.

Full text
Abstract:
The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cr
APA, Harvard, Vancouver, ISO, and other styles
43

Gopalan, S. Harihara, A. Manikandan, N. P. Dharani, and G. Sujatha. "Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks." International Journal of Networked and Distributed Computing, May 28, 2024. http://dx.doi.org/10.1007/s44227-024-00029-w.

Full text
Abstract:
AbstractThe proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT environments by leveraging blockchain technology, the Elliptic Curve Digital Signature Algorithm (ECDSA) for secure authentication, and Multi-Task Transformer (MTT) for efficient traffic classification. This paper presents a novel approach to mitigate de-authentication attacks in IoT ecosystems. The research methodology involves developing and implementing the BBMDA framework, followed by a comprehensive evaluation and comparison with existing t
APA, Harvard, Vancouver, ISO, and other styles
44

Taqieddin, Eyad S. "On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols." International Journal of Communication Networks and Information Security (IJCNIS) 9, no. 2 (2022). http://dx.doi.org/10.17762/ijcnis.v9i2.2376.

Full text
Abstract:
Mutual authentication is essential to guarantee the confidentiality, integrity, and availability of an RFID system. One area of interest is the design of lightweight mutual authentication protocols that meet the limited computational and energy resources of the tags. These protocols use simple operations such as permutation and cyclic redundancy code for cryptographic purposes. However, these functions are cryptographically weak and are easily broken. In this work, we present a case against the use of these functions for cryptographic purposes, due to their simplicity and linear properties, by
APA, Harvard, Vancouver, ISO, and other styles
45

Suresh Kumar, V., Osamah Ibrahim Khalaf, Radha Raman Chandan, et al. "Implementation of a novel secured authentication protocol for cyber security applications." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-76306-z.

Full text
Abstract:
AbstractRobust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality. The proposed protocol utilizes a combinatio
APA, Harvard, Vancouver, ISO, and other styles
46

Kydyrbekova, A., and D. Oralbekova. "SPEAKER IDENTIFICATION USING DISTRIBUTION-PRESERVING X-VECTOR GENERATION." Physico-mathematical series, no. 4 (December 4, 2024). https://doi.org/10.32014/2024.2518-1726.314.

Full text
Abstract:
With the increasing use of voice assistants and spoken language interfaces, important concerns have arisen regarding the privacy of voice data. In an attempt to mitigate the threat of attacks on voice data, in this paper we propose an x-vector identification and authentication system. This method modifies the speaker's pitch and accent information from the original speech signal. The proposed method produces a more natural-sounding anonymized voice in addition to the de-identified speaker. However, it yields a relative EER improvement of up to 19.30% for the identified-anonymized registration-
APA, Harvard, Vancouver, ISO, and other styles
47

Cheng, Z., and L. Chen. "Certicateless Public Key Signature Schemes from Standard Algorithms." September 7, 2020. https://doi.org/10.5281/zenodo.4017195.

Full text
Abstract:
Certi cateless public key cryptography (CL-PKC) is designed to have suc- cinct public key management without using certi cates at the same time avoid the key-escrow attribute in the identity-based cryptography. However, it ap- pears dicult to construct CL-PKC schemes from standard algorithms. Secu- rity mechanisms employing self-certi ed key (also known as implicit certi cate) can achieve same goals. But there still lacks rigorous security de nitions for implicit-certi cate-based mechanisms and such type of schemes were not ana- lyzed formally and often found vulnerable to attacks later. In th
APA, Harvard, Vancouver, ISO, and other styles
48

Csatár, János, Péter Görgey, and Tamás Holczer. "Villamos rendszerek kiberbiztonsága az Ukrajnával kapcsolatos történések tükrében." Scientia et Securitas, March 28, 2024, 1–12. http://dx.doi.org/10.1556/112.2023.00158.

Full text
Abstract:
Összefoglalás. Minden fejlett ország erősen függ a villamosenergia-rendszerek működésétől, ami az idő előrehaladtával várhatóan növekedni fog. A stabil működést számos faktor befolyásolja, ezek egy része véletlenszerű (pl. időjárás), de az emberi tényező is nagy hatással van a megbízhatóságra. Ebben a cikkben a szándékos károkozás azon speciális eseteivel foglalkozunk, amikor a támadó a rendszert felügyelő és irányító számítógépes rendszeren keresztül befolyásolja károsan a villamosenergia-rendszer alapvető működését. Ehhez áttekintjük a két rendszer összefonódását, megvizsgáljuk az elmúlt nyo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!