To see the other types of publications on this topic, follow the link: Mobile attacker.

Journal articles on the topic 'Mobile attacker'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile attacker.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Christopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.

Full text
Abstract:
With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xueou, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, and Martín Ochoa. "Constrained Proximity Attacks on Mobile Targets." ACM Transactions on Privacy and Security 25, no. 2 (2022): 1–29. http://dx.doi.org/10.1145/3498543.

Full text
Abstract:
Proximity attacks allow an adversary to uncover the location of a victim by repeatedly issuing queries with fake location data. These attacks have been mostly studied in scenarios where victims remain static and there are no constraints that limit the actions of the attacker. In such a setting, it is not difficult for the attacker to locate a particular victim and quantifying the effort for doing so is straightforward. However, it is far more realistic to consider scenarios where potential victims present a particular mobility pattern. In this article, we consider abstract (constrained and unconstrained) attacks on services that provide location information on other users in the proximity. We derive strategies for constrained and unconstrained attackers, and show that when unconstrained they can practically achieve success with theoretically optimal effort. We then propose a simple yet effective constraint that may be employed by a proximity service (for example, running in the cloud or using a suitable two-party protocol) as a countermeasure to increase the effort for the attacker several orders of magnitude both in simulated and real-world cases.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yaru, Ning Zheng, Ming Xu, et al. "Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App." Sensors 19, no. 14 (2019): 3052. http://dx.doi.org/10.3390/s19143052.

Full text
Abstract:
Mobile payment apps have been widely-adopted, which brings great convenience to people’s lives. However, at the same time, user’s privacy is possibly eavesdropped and maliciously exploited by attackers. In this paper, we consider a possible way for an attacker to monitor people’s privacy on a mobile payment app, where the attacker aims to identify the user’s financial transactions at the trading stage via analyzing the encrypted network traffic. To achieve this goal, a hierarchical identification system is established, which can acquire users’ privacy information in three different manners. First, it identifies the mobile payment app from traffic data, then classifies specific actions on the mobile payment app, and finally, detects the detailed steps within the action. In our proposed system, we extract reliable features from the collected traffic data generated on the mobile payment app, then use a series of well-performing ensemble learning strategies to deal with three identification tasks. Compared with prior works, the experimental results demonstrate that our proposed hierarchical identification system performs better.
APA, Harvard, Vancouver, ISO, and other styles
4

Bang, Hyo-Chan, Jin-Oh Him, Jung-Chan Na, Joong-Su Jang, and Young-Suk Lee. "Attacker Response Framework using Mobile Code." KIPS Transactions:PartC 11C, no. 7 (2004): 959–70. http://dx.doi.org/10.3745/kipstc.2004.11c.7.959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fang, F., A. X. Jiang, and M. Tambe. "Protecting Moving Targets with Multiple Mobile Resources." Journal of Artificial Intelligence Research 48 (November 17, 2013): 583–634. http://dx.doi.org/10.1613/jair.4027.

Full text
Abstract:
In recent years, Stackelberg Security Games have been successfully applied to solve resource allocation and scheduling problems in several security domains. However, previous work has mostly assumed that the targets are stationary relative to the defender and the attacker, leading to discrete game models with finite numbers of pure strategies. This paper in contrast focuses on protecting mobile targets that leads to a continuous set of strategies for the players. The problem is motivated by several real-world domains including protecting ferries with escort boats and protecting refugee supply lines. Our contributions include: (i) A new game model for multiple mobile defender resources and moving targets with a discretized strategy space for the defender and a continuous strategy space for the attacker. (ii) An efficient linear-programming-based solution that uses a compact representation for the defender's mixed strategy, while accurately modeling the attacker's continuous strategy using a novel sub-interval analysis method. (iii) Discussion and analysis of multiple heuristic methods for equilibrium refinement to improve robustness of defender's mixed strategy. (iv) Discussion of approaches to sample actual defender schedules from the defender's mixed strategy. (iv) Detailed experimental analysis of our algorithms in the ferry protection domain.
APA, Harvard, Vancouver, ISO, and other styles
6

Mitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.

Full text
Abstract:
With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammadani, Khalid Hussain, Kamran Ali Memon, Imran Memon, Nazish Nawaz Hussaini, and Hadiqua Fazal. "Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks." International Journal of Distributed Sensor Networks 16, no. 5 (2020): 155014772092162. http://dx.doi.org/10.1177/1550147720921624.

Full text
Abstract:
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
APA, Harvard, Vancouver, ISO, and other styles
8

Mostovoy, R. A., A. B. Levina, D. M. Sleptsova, and P. S. Borisenko. "SIDE-CHANNEL ATTACKS ON THE MOBILE PHONES." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 186 (December 2019): 46–53. http://dx.doi.org/10.14489/vkit.2019.12.pp.046-053.

Full text
Abstract:
Currently, attacks on side channels are the main method of cryptanalysis, but despite this, these attacks have a very specific model of the attacker. As a result, the practical usage of side-channel attacks is sometimes disputable. The level of threat in each case should be assessed taking into account the individual characteristics of a specific target system. Client applications, such as mobile phone applications, are especially vulnerable due to easy access to the device, so it's required to pay sufficient attention to their security, since they are more accessible to the attacker and usually contain a large amount of confidential information. This study represents an assessment of the informativeness of signals from side channels received from mobile phones. The studies used not expensive equipment to minimize the requirements for the level of the attacker and, consequently, increase the applicability of the attack. This undoubtedly leads to the complication of the attacks, so the NICV algorithm was used to analyze the data obtained. The NICV (normalized interclass variance) algorithm can significantly improve the efficiency of the analysis of the traces obtained during an attack by reducing the number of points.
APA, Harvard, Vancouver, ISO, and other styles
9

Gara, Fatma, Leila Ben Saad, and Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility." International Journal on Semantic Web and Information Systems 13, no. 3 (2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.

Full text
Abstract:
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors design, implement, and evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power and lossy networks. The new intrusion detection system can be extended to other attacks such as wormhole and sybil attacks. The simulations results show that the detection probability is 100% for selective attackers under some cases.
APA, Harvard, Vancouver, ISO, and other styles
10

Miao, Li, Shuai Li, Xiangjuan Wu, and Bingjie Liu. "Mean-Field Stackelberg Game-Based Security Defense and Resource Optimization in Edge Computing." Applied Sciences 14, no. 9 (2024): 3538. http://dx.doi.org/10.3390/app14093538.

Full text
Abstract:
Edge computing brings computation and storage resources to the edge of the mobile network to solve the problems of low latency and high real-time demand. However, edge computing is more vulnerable to malicious attacks due to its open and dynamic environments. In this article, we investigate security defense strategies in edge computing systems, focusing on scenarios with one attacker and multiple defenders to determine optimal defense strategies with minimal resource allocation. Firstly, we formulate the interactions between the defenders and the attackers as the mean-field Stackelberg game model, where the state and the objective functions of the defenders are coupled through the mean-field term, and are strongly influenced by the strategy of the attacker. Then, we analyze the local optimal strategies of the defenders given an arbitrary strategy of the attackers. We demonstrate the Nash equilibrium and the mean-field equilibrium for both the defenders and the attackers. Finally, simulation analysis will illustrate the dynamic evolution of the defense strategy of the defenders and the trajectory of the attackers based on the proposed Stackelberg game model.
APA, Harvard, Vancouver, ISO, and other styles
11

Mitra, Sulata, and Priyodarshini Dhar. "Two Variants of Secure Routing Algorithms in Mobile Ad Hoc Network." International Journal of Sensors, Wireless Communications and Control 9, no. 1 (2019): 80–110. http://dx.doi.org/10.2174/2210327908666180807100746.

Full text
Abstract:
Background and Objective: Two different variants of secure routing algorithms are proposed in the present work. In both the variants a stable route is established between source and destination. Methods: The selected route is associated with the nodes having sufficient energy to establish the route and to transmit the data packets, minimum velocity to reduce the frequency of link failure, maximum distance from the source node to reduce the number of hops in the selected route, minimum number of neighbors to reduce the routing overhead. Each variant has two phases. In the first phase it is assumed that the selected route has no attackers. The first phase is made more realistic in the second phase by considering the presence of attacker in the selected route. In the first variant a node associated with the selected route overhears the transmission of the next forwarder node to detect an attacker node in the routing path. But a node may fail to overhear its next hop in presence of hidden node, due to limited overhear range etc. Such problem is eliminated in the second variant. In the second variant each node associated with the selected route searches its data packet buffer for the reception of the next data packet from its predecessor node associated with the same route and suspects the predecessor node as an attacker in case the next data packet is not found in the buffer. The performance of both the variants is compared on the basis of packet delivery ratio, throughput and average end-to-end delay. Results: The throughput and packet delivery ratio are higher in the second variant than the first variant whereas the average end-to-end delay is less in the second variant than the first variant. Conclusion: Moreover both the variants outperform the existing schemes in terms of packet delivery ratio, throughput and average end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
12

El-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.

Full text
Abstract:
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile computing apps, since in the first model the devices run cloud based web applications not as mobile computing native apps. Services of Mobile-based systems via cloud are accessing and sharing through internet connection thus they are open for attacker to attack on its security. Distributed Denial of Service (DDoS) attacks can cause a big problem in mobile cloud computing security. The main objective of DDoS attacks is to infect wireless devises resources (e.g., software applications, wireless network, etc.) and make them unavailable to the authorized user. In DDoS, the attacker tries to overload the Mobile-based service with traffic. The main objective of this research paper is to introduce novel model for securing Mobile-based systems against DDoS attacks. Efficiency and performance analysis evaluations of the proposed model are presented. The feedbacks of the experimental results were highly promising, for protecting mobile-based cloud computing systems against DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
13

Ghouzali, Sanaa, Maryam Lafkih, Wadood Abdul, Mounia Mikram, Mohammed El Haziti, and Driss Aboutajdine. "Trace Attack against Biometric Mobile Applications." Mobile Information Systems 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/2065948.

Full text
Abstract:
With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen). Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.
APA, Harvard, Vancouver, ISO, and other styles
14

Janan Farag Yonan and Nagham Amjed Abdul Zahra. "Node Intrusion Tendency Recognition Using Network Level Features Based Deep Learning Approach." Babylonian Journal of Networking 2023 (January 10, 2023): 1–10. http://dx.doi.org/10.58496/bjn/2023/001.

Full text
Abstract:
Adhoc network is highly susceptible for intrusion attacks due to the simplified accesscontrol and compacted network stack. Malicious node recognition in Mobile adhocnetwork (MANET) is challengeable due to nodes mobility and limited coverageof nodes. Thus, link may keep fluctuating throughout the communication period.In this paper, deep analytic model is made for extracting attacker node behaviorsfrom networking point of view. Attributed such as link durations, re-healing timeand number of received packets (by attacker) was the main features of this work.Later, deep learning paradigm is integrated to perform attacker node recognition. Dataobtained from network analytical model is used to train three different models namelyFeed forward neural network (FFNN), Cascade backpropagation neural network(CBPNN) and Convolutional neural network (CNN). Attacker node recognitionaccuracy of 85.5
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Pei-Yu, and Frank Yeong-Sung Lin. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/207141.

Full text
Abstract:
With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the “gradient method” and “game theory” are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.
APA, Harvard, Vancouver, ISO, and other styles
16

Anubha and P. S. Bed R. "Detection of Clone Attacks in Manets using Ant Colony Optimization." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 426–29. https://doi.org/10.35940/ijeat.C6297.049420.

Full text
Abstract:
Wireless and mobile computing enables the spontaneous networking of a system with or without previous set-up. Mobile Ad Hoc Network (MANET) is a Wi-Fi grid that has already been developed and does not require an existing infrastructure for a specific extemporaneous operation. Any node can then connect or exit the network, which will permit the attacker to access the whole system. These networks are liable to various attacks. This paper directs detection of the clone attack from MANETs in which the attacker node steals the id of the closing node, twin it and attracts all the data towards it. ACO noticed the clone attack and measured performance based on the packet drops, packet delivery ratio and network throughput.
APA, Harvard, Vancouver, ISO, and other styles
17

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector routing. We adopt On Demand Distance Vector routing solely based on source routing and “On Demand” process, so each packet does not have to transmit any periodic routing information. We implemented intrusion detection system with five different nodes and the performance parameters like packet delivery ratio, throughput, delay are computed with attacker and without attacker and on demand distance vector routing protocols is proposed to implement in hardware using Zigbee</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Guzhakovskaya, Kristina, and Yuriy Umnitsyn. "Protocol SS7 and the Security of Mobile Networks." NBI Technologies, no. 4 (February 2019): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.4.1.

Full text
Abstract:
The paper considers Global System for Mobile Communications, which plays the important role in contemporary society and carries new forms of dialog in the modern world. It is shown, that GSM-nets play two roles: firstly, they serve as communication tools for people who are in any point of world, and secondly, they can be used as tools for confidential data theft due to the old technology for telephone exchange setting, created as early as in the 1970s. Attacks using SS7 are often executed by hackers. After all, the attacker does not have to be close to the subscriber, and the attack can be made from anywhere on the planet. Therefore, to calculate the attacker is almost impossible, through this vulnerability can be hacked through almost any phone in the world. It will not be difficult to eavesdrop on conversations, intercept SMS, get access to the mobile Bank, social networks because of the vulnerability in the SS7 telephone infrastructure, through which service commands of cellular networks are transmitted. Due to the fact that the vulnerability with the Protocol SS7 is on the side of the operator, protection from such an attack is impossible. Until mobile operators are able to abandon this technology, this threat in the field of information security will remain relevant.
APA, Harvard, Vancouver, ISO, and other styles
19

Qin, Huawang, Xiaohua Zhu, and Yuewei Dai. "A proactive quantum secret sharing scheme based on GHZ state." Modern Physics Letters B 29, no. 27 (2015): 1550165. http://dx.doi.org/10.1142/s0217984915501651.

Full text
Abstract:
A proactive quantum secret sharing scheme is proposed, in which the participants can update their shadows periodically. In an updating period, one participant randomly generates the GHZ states and sends the particles to the other participants, and the participants update their shadows according to the measurement performed on the particles. After an updating period, each participant can change his shadow but the secret is changeless. The old shadows will be useless even if they have been stolen by the attacker. The proactive property is very useful to resist the mobile attacker.
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Hui, Xuesong Pan, Xinluo Wang, Haonan Feng, and Chengjie Shi. "Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices." Wireless Communications and Mobile Computing 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8819790.

Full text
Abstract:
We present a novel attack named “Authenticator Rebinding Attack,” which aims at the Fast IDentity Online (FIDO) Universal Authentication Framework (UAF) protocol implemented on mobile devices. The presented Authenticator Rebinding Attack rebinds the victim’s identity to the attacker’s authenticator rather than the victim’s authenticator being verified by the service in the UAF protocol, allowing the attacker to bypass the UAF protocol local authentication mechanism by imitating the victim to perform sensitive operations such as transfer and payment. The lack of effective authentication between entities in the implementations of the UAF protocol used in the actual system causes the vulnerability to the Authenticator Rebinding Attack. In this paper, we implement this attack on the Android platform and evaluate its implementability, where results show that the proposed attack is implementable in the actual system and Android applications using the UAF protocol are prone to such attack. We also discuss the possible countermeasures against the threats posed by Authenticator Rebinding Attack for different stakeholders implementing UAF on the Android platform.
APA, Harvard, Vancouver, ISO, and other styles
21

Hamsha and Nagaraj. "A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC REPORTS." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 51–62. https://doi.org/10.5281/zenodo.7379495.

Full text
Abstract:
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been associated to business, socially and in some critical applications like Military etc, The network which is formed by self configuring wireless links which are connected to each other. These applications are categorized by hostile environment that they serve while communicating between nodes. However in such Wireless Network will be more exposed to different types of security attacks. The challenge is to meet secure network communication. In this paper we focus on cluster based secure communication to improve the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures. The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens are requested to classify and expel the attacker nodes which submit wrong reports.  
APA, Harvard, Vancouver, ISO, and other styles
22

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the security issues cultivate resulting in welcoming various lethal vulnerabilities. Out of various Denial of Service (DoS) attacks in MANET, Flooding attackis considered most challenging adversarial modules that tremendously affect the communication system in MANET. In this paper, various previously used techniques are discussed for mitigating Flooding attacks in MANET. The uniqueness of this article is that it presents a comparative study of existing techniques for detecting Flooding attacks in MANET. Finally, we proposed a new technique based on threshold value for detecting Flooding attacker nodes in MANET.
APA, Harvard, Vancouver, ISO, and other styles
23

G., Theivanathan, P. Kavitha V., Magesh V., and Usharani M. "A Novel Cooperative of Cluster Member Nodes with Watchdog for Detecting Attacker Nodes." Research and Applications: Emerging Technologies 4, no. 2 (2022): 1–13. https://doi.org/10.5281/zenodo.7074623.

Full text
Abstract:
<em>A peer-to-peer network of mobile nodes that may communicate with one another in the absence of a supporting infrastructure is known as a mobile ad hoc network (MANET). Nodes can directly connect via wireless links with their own neighbours (i.e., nodes within radio range). In any case, non-neighboring nodes can still communicate by acting as relays to send packets to their destinations utilizing other intermediate nodes. This type of network is appropriate in all situations when a speedy network deployment is required, but the availability of access points is not assured because it lacks a stable infrastructure. This is particularly crucial for networks with irregular connections, like delay tolerant networks (DTNs), because watchdogs occasionally lack the time or knowledge to find the selfish nodes. For wireless sensor networks to function correctly and provide secure communications, MANETs presuppose that mobile nodes would cooperate voluntarily (WSNs). A collaborative strategy called Watchdog (CoCoWa) is based on the spread of selfish local nodes&#39; awareness of contacts.</em>
APA, Harvard, Vancouver, ISO, and other styles
24

Sun, Da-Zhi, and Ji-Dong Zhong. "Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing." Security and Communication Networks 2021 (June 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5598574.

Full text
Abstract:
As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS). However, the massive deployment of personal Bluetooth-enabled devices also raises privacy concerns on their wielders. Hence, we investigate the privacy of the unilateral authentication protocol according to the recent Bluetooth standard v5.2. The contributions of the paper are twofold. (1) We demonstrate that the unilateral authentication protocol suffers from privacy weakness. That is, the attacker is able to identify the target Bluetooth-enabled device once he observed the device’s previous transmitted messages during the protocol run. More importantly, we analyze the privacy threat of the Bluetooth MCS, when the attacker exploits the proposed privacy weakness under the typical Internet of Things (IoT) scenarios. (2) An improved unilateral authentication protocol is therefore devised to repair the weakness. Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard. Additionally, the improved protocol can be easily adapted to the Bluetooth standards because it merely employs the basic cryptographic components available in the standard specifications. In addition, we also suggest and evaluate two countermeasures, which do not need to modify the original protocol.
APA, Harvard, Vancouver, ISO, and other styles
25

S Monish, Dr.K.Radhika, S Naveenkumar, and R Ponkumar. "Design and Implementation of ATM Security Using IOT." international journal of engineering technology and management sciences 9, no. 2 (2025): 234–43. https://doi.org/10.46647/ijetms.2025.v09i02.031.

Full text
Abstract:
This paper proposes a secured ATM (Automated Teller Machine) system thatenhances traditional security protocols by incorporating a card scanning system along with a linkbased authentication feature. Current ATM systems typically rely on a two-factor authenticationmodel, where the user must have the ATM card and know the PIN. However, this method remainsvulnerable to fraud if an attacker gains access to both the card and PIN. The proposed systemaddresses this issue by adding an extra layer of security: a link-based authentication process. In thissystem, after the user scans their ATM card and enters their PIN to authenticate, they can view theiraccount details. However, when the user selects the "Money Withdrawal" option, the systemgenerates and sends a unique, time-sensitive link to the user’s registered mobile phone. The usermust then enter this link into the ATM system in order to complete the withdrawal. This additionalstep ensures that even if an attacker gains access to the card and PIN, they cannot performfraudulent transactions without access to the user's registered mobile phone. The proposed systemthus provides a more secure method for ATM transactions by implementing a two level securitystructure, combining something the user knows (PIN) with something the user has (mobile phone).This enhances the protection of user accounts and reduces the risk of unauthorized ATMwithdrawals.
APA, Harvard, Vancouver, ISO, and other styles
26

Kaushik, Sheetal, Khushboo Tripathi, Rashmi Gupta, and Prerna Mahajan. "Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack." Journal of Autonomous Intelligence 7, no. 5 (2024): 1488. http://dx.doi.org/10.32629/jai.v7i5.1488.

Full text
Abstract:
&lt;p&gt;This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimistic responses. In this study, the author proposes a novel security solution, the K-AOMDV (KNN- Ad Hoc On-Demand Multi-Path Routing protocol) that uses K-means clustering to prevent routing misbehaviour. The efficiency of the proposed K-AOMDV routing protocol is analyzed using supervised machine learning approach to predict optimal routes with minimal packet hops between nodes. The proposed algorithm has a high accuracy rate of 0.99%, 80% true positives, and 80% recall. It communicates the black hole attacker’s node identification (ID) into the network, ensuring that the attacker will not participate in the routing method in the future. The privacy domain in MANET is the main focus of this research, and the proposed solution affiliates an effective approach to enhancing the security of MANETs.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
27

Cadena Muñoz, Ernesto, Gustavo Chica Pedraza, and Alexander Aponte Moreno. "Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks." Future Internet 16, no. 12 (2024): 456. https://doi.org/10.3390/fi16120456.

Full text
Abstract:
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the attacker the service as a legitimate user and use the Primary Users’ (PUs) spectrum resources. This problem has been addressed from perspectives like arrival time, position detection, cooperative scenarios, and artificial intelligence techniques (AI). Nevertheless, it has been studied with one PUE attack at once. This paper implements a countermeasure that can be applied when several attacks simultaneously exist in a cooperative network. A deep neural network (DNN) is used with other techniques to determine the PUE’s existence and communicate it with other devices in the cooperative MCRN. An algorithm to detect and share detection information is applied, and the results show that the system can detect multiple PUE attacks with coordination between the secondary users (SUs). Scenarios are implemented on software-defined radio (SDR) with a cognitive protocol to protect the PU. The probability of detection (PD) is measured for some signal-to-noise ratio (SNR) values in the presence of one PUE or more in the network, which shows high detection values above 90% for an SNR of -7dB. A database is also created with the attackers’ data and shared with all the SUs.
APA, Harvard, Vancouver, ISO, and other styles
28

H, ATEEQ AHMED, SAMSON PAUL K, and HARISH KUMAR REDDY B. "ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS." International Journal of Engineering Technology and Management Sciences 4, no. 5 (2020): 45–48. http://dx.doi.org/10.46647/ijetms.2020.v04i05.008.

Full text
Abstract:
Mobile Ad Hoc is a network connection method which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station. Instead, devices discover others within range to form a network for those computers. These networks often suffer with a problem of Malicious attacks from different types of attackers. Many attacks which often occur are based on the principle of Authentication, Confidentiality &amp; Integrity. MANETs tends to be very prone to complex types of attacks as it is very easy for the attacker to gain control on it due to its inadequate Security mechanism. In this paper, a proposed scheme is narrated which will further strengthens the Mechanism of Security. Instead of using a Unique key, Discrete keys are used for Encryption &amp; Decryption mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
29

Paramasivan, B., and M. Kaliappan. "Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/608984.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
APA, Harvard, Vancouver, ISO, and other styles
30

Yonathan, Alfius. "Analysis of Twitter-based Malware Propagation using SIR Epidemic Model." Journal of Applied Information, Communication and Technology 5, no. 1 (2018): 11–19. http://dx.doi.org/10.33555/ejaict.v5i1.45.

Full text
Abstract:
This paper presented an analysis of malware propagation scenario in which attacker exploit news spreading dynamics on Twitter. The malware propagation starts with an attacker crafting tweets about breaking news, event or tragedy that will lure user to click the short-URL provided in the tweet which then redirect user to malicious website, which in turn installed the malware in the user mobile device or computer. As the information spread in the Twitter then more users will be infected with malware. The underlying principle to analyze this type of malware propagation is that the spreading of information in Twitter can be modeled by using formal epidemic model of disease. The simulation result of the model shows parameters that highly impacting the spread of malware using Twitter as the medium.
APA, Harvard, Vancouver, ISO, and other styles
31

Yongjin Park, Taeyong Park, Sung Tae Kim, and Jeong Hyun Yi. "Mobile Code Packing Scheme Based on Multi-partitioned Bytecode Wrapping." Research Briefs on Information and Communication Technology Evolution 2 (March 31, 2016): 117–23. http://dx.doi.org/10.56801/rebicte.v2i.40.

Full text
Abstract:
Android apps are structurally more vulnerable to reverse engineering attacks relative to other mobileapps. Several different methods are being employed to protect apps from such attacks, and amongthose is packing. However, even with packing, a problem exists where the attacker can obtain theentire original bytecode through dynamic analysis. As a result, in this paper, we propose a scheme toimprove existing methods by addressing the problem of exposing all of the original bytecode by firstsplitting the original bytecode into multiple parts and then wrapping and dropping them to preventreverse engineering analysis. Furthermore, we constructed the proposed scheme and compared itsperformance and level of security with alternative existing methods.
APA, Harvard, Vancouver, ISO, and other styles
32

Sehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks." International Journal of Engineering & Technology 7, no. 2.4 (2018): 157. http://dx.doi.org/10.14419/ijet.v7i2.4.13029.

Full text
Abstract:
wireless sensor network is the growing field of research having capacity to help the mankind with its usage in varied areas like military surveillance, medical etc. However these networks are vulnerable to certain attacks like black hole, wormhole and selective forwarding. In this paper selective forwarding attack is analyzed on varying number of attacker nodes and its impact on different performance parameters. It is concluded that the performance of the entire network is degraded with the increase in the number of malicious nodes.
APA, Harvard, Vancouver, ISO, and other styles
33

A., T. Ravi, and Gowri Priya N. "SECURING DATA IN MOBILE CLOUD COMPUTING USING CUBICAL TECHNIQUE FOR KEY MANAGEMENT." International Journal of Computational Research and Development 2, no. 1 (2017): 55–58. https://doi.org/10.5281/zenodo.546298.

Full text
Abstract:
Traffic interception is one of the important and major problems in the present era. Whenever we are developing algorithms for construction of more security for the data there is an equal or more chances for the malicious users to develop algorithms to destruct the data or network. We need to be more cautious of the problems when we are using third party for data and key storage. Present days we need to store data and key values are to be stored in third party servers called cloud servers. When we are using mobile devices for data transfer and key transfer we need to send them in secure manner. When mobile devices are moving from one place to another place they need to travel in sensitive networks. During handover management attackers may gain their access by impersonation. Attacker may have every chance to take advantage of stealing access credentials of actual user. When we are sending data in network some malicious users may see or modify the data. Cryptanalysis may be the problem. In order to avoid the problem we need to store key/data in cloud server in secured way by splitting the key and applying Homomorphism Algorithm which may depend on third party for key/data storage. In order to store them in secure manner we are using Cubical Technique by distributing the key in multiple clouds.
APA, Harvard, Vancouver, ISO, and other styles
34

Iyas, Alodat. "EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 15–26. https://doi.org/10.5281/zenodo.4922192.

Full text
Abstract:
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we&#39;re focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
APA, Harvard, Vancouver, ISO, and other styles
35

Malviya, Taruna, and Khushboo Sawant. "Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 96. http://dx.doi.org/10.23956/ijarcsse.v7i8.31.

Full text
Abstract:
A wireless sensor networks is a temporary, infrastructure less network where nodes communicate without any centralized mechanism. This dynamic behaviour of WSN makes this network more potentially applicable in conference, battlefield environment and disaster relief, and has received significant attention in recent years. Attacker may use this weakness to disrupt the network. Subsequently, Power draining is the major thread; where attacker not only exhausts the network traffic but also degrades the life of node as well network. The objective of this study is to detect and prevent wireless sensor networks from unwanted power draining due to Vampire attack. Here, Targeted Flooding through high battery capacity node has been used to deploy Vampire attack in mobile ad-hoc network. Subsequently, energy consumption and capacity observation technique has been used to detect malicious node(s). Furthermore, prevention method forcefully shutdown malicious nodes and transfer communication.
APA, Harvard, Vancouver, ISO, and other styles
36

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Qinglong, Haiping Huang, Wenming Wang, Qi Li, and Yuhan Wu. "An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices." Wireless Communications and Mobile Computing 2020 (December 18, 2020): 1–9. http://dx.doi.org/10.1155/2020/8888679.

Full text
Abstract:
With the increasing number of smart mobile devices, applications based on mobile network take an indispensable role in the Internet of Things. Due to the limited computing power and restricted storage capacity of mobile devices, it is very necessary to design a secure and lightweight authentication scheme for mobile devices. As a lightweight cryptographic primitive, the hash chain is widely used in various cryptographic protocols and one-time password systems. However, most of the existing research work focuses on solving its inherent limitations and deficiencies, while ignoring its security issues. We propose a novel construction of hash chain that consists of multiple different hash functions of different output lengths and employ it in a time-based one-time password (TOTP) system for mobile device authentication. The security foundation of our construction is that the order of the hash functions is confidential and the security analysis demonstrates that it is more secure than other constructions. Moreover, we discuss the degeneration of our construction and implement the scheme in a mobile device. The simulation experiments show that the attacker cannot increase the probability of guessing the order by eavesdropping on the invalid passwords.
APA, Harvard, Vancouver, ISO, and other styles
38

Heshem, A. El Zouka. "PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 31–41. https://doi.org/10.5281/zenodo.8300141.

Full text
Abstract:
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks. Any attacker can have complete control over the communication channel, listen to phone calls, read email, and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a middleware security system that aims to protect the GSM communication channel and minimize the computational overheads of the provided authentication and cryptographic schemes of the network The proposed scheme supports an end-to-end secured communication between the GSM mobile devices and the GSM base stations; insure compatibility between wireless GSM devices (telephones, PDAs, etc.), and easy to install without any modification of the current systems.
APA, Harvard, Vancouver, ISO, and other styles
39

Jolin, J. S., A. Theophilus, and A. Kathirvel. "Two-factor Mutual Authentication with Fingerprint and MAC Address Validation." International Journal of Computer Network and Information Security 16, no. 6 (2024): 56–68. https://doi.org/10.5815/ijcnis.2024.06.05.

Full text
Abstract:
Mobile Ad hoc NETworks (MANET), unlike typical wireless networks, may be used spontaneously without the need for centralized management or network environment. Mobile nodes act as mediators to help multi-hop communications in such networks, and most instances, they are responsible for all connectivity tasks. MANET is a challenging endeavor because these systems can be attacked, which can harm the network. As a result, security concerns become a primary factor for these types of networks. This article aims to present an efficient two-factor smart card-based passcode authentication technique for securing legitimate users on an unprotected network. This scheme enables the password resetting feature. A secured mechanism for sharing keys is offered by using the hash function. We present a new two-factor mutual authentication technique based on an entirely new mechanism called the virtual smart card. Compared to authentication, the proposed method has fewer computation processes but is more time efficient since it is based on a hash function. Additionally, this approach is resistant to most attacker behaviors, such as Mutual authentication, Gateway node bypassing attacks, DoS attacks, replay attacks, Man in the middle attacks, and stolen smart device attacks. Experimental results validate the efficiency of this scheme, and its security is also analyzed.
APA, Harvard, Vancouver, ISO, and other styles
40

Manikumar, V. R. Balaji, Nirmala Paramanandham, and M. Murugan. "Guardian device for women - a survey and comparison study." Journal of Physics: Conference Series 2115, no. 1 (2021): 012030. http://dx.doi.org/10.1088/1742-6596/2115/1/012030.

Full text
Abstract:
Abstract Nowadays women are facing many problems; the most common problems are mental and physical harassment. In order to secure women from such harassments, we propose a novel device Guardian Device for women. The device works with a trigger, microcontroller, GSM module, GPS module, IoT module, Neuro Stimulator, Buzzer, Vibrating Sensor, Pulse sensor, Solar charging battery and a button sized camera. The women can switch ON the trigger whenever they feel danger. The device will activate the global positioning system (GPS), which obviously will track the exact position of the device. The device sends an emergency message to the registered mobile number and nearby police station. The button sized camera captures the image of an attacker and sends the copy to the police stations nearby. Neuro stimulator will give unethical shock to the attacker and a buzzer gives an alarm which alerts the people surrounding the victim.
APA, Harvard, Vancouver, ISO, and other styles
41

Gopalakrishnan. "INTRUSION DETECTION IN MOBILE AD HOC NETWORK USING SECURE ROUTING FOR ATTACKER IDENTIFICATION PROTOCOL." American Journal of Applied Sciences 11, no. 8 (2014): 1391–97. http://dx.doi.org/10.3844/ajassp.2014.1391.1397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Yongjin, and Ahmed Helmy. "CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks." Ad Hoc Networks 8, no. 2 (2010): 193–213. http://dx.doi.org/10.1016/j.adhoc.2009.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Saini, Mayank Singh, and Sheenu Rizvi. "Vulnerabilities in Android OS and Security of Android Devices." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 3, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jieee/003.01.004.

Full text
Abstract:
The number of malicious mobile and android based application targeting Android users and their smartphones has increase at a fast rate. In addition, these malicious harms causing application are powerful enough to download modules from remote servers which are usually run by malicious infectors, due to which unexpected events can be triggered inside the smartphones. Then, the attacker gets control and hold on the personal and private information and data which is stored within the person’s smartphone illegally.
APA, Harvard, Vancouver, ISO, and other styles
44

Melnikova, Anastasia, and Igor Karmanov. "DEVELOPMENT OF THE METHODOLOGY FOR PENETRATION TESTING OF MOBILE AND WEB APPLICATIONS." Interexpo GEO-Siberia 9 (2019): 47–53. http://dx.doi.org/10.33764/2618-981x-2019-9-47-53.

Full text
Abstract:
The relevance of the topic is due to the fact that penetration testing (tests to overcome protection, penetration testing, pentest) is a worldwide popular service in the field of information security. The essence of such work is an authorized attempt to circumvent the existing set of protection means of information system. During testing, the auditor performs the role of an attacker motivated to violate the information security of customer's network. In article, features of penetration testing are thoroughly studied, a detail analysis of existing foreign solutions in the field of penetration testing is performed, a proprietary technique is developed and recommendations for improving the existing techniques are proposed.
APA, Harvard, Vancouver, ISO, and other styles
45

Mathi, Senthil Kumar, Pavittra Kalyaan, Kanimozhi S., and Bhuvaneshwari S. "Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks." Defence Science Journal 67, no. 3 (2017): 276. http://dx.doi.org/10.14429/dsj.67.10118.

Full text
Abstract:
Long term evolution based fourth generation (4G) mobile technology has provided a platform for fast and efficient wireless communication. The advanced encryption standard (AES) is one of the three cryptographic algorithms used in 4G networks for encryption of sensitive data. In spite of offering high immunity, AES is still vulnerable to few attacks. This weakness in AES algorithm makes 4G susceptible to several security issues. This paper specifically focuses on fault attacks performed on AES. A fault induced in any one of the rounds of AES helps the attacker to derive information about the secret key. In this manner, these fault attacks pose a serious threat to wireless mobile communication as he or she may gain access to any network that is encrypted with AES. In earlier works, various countermeasures have been suggested to prevent them. However, each of these preventive measures has their own limitations and vulnerabilities. This paper proposes an enhanced method of preventing fault attacks in AES by incorporating a combination of non-linear and linear diffusion techniques. This method identifies if a fault has been injected and diffuses the fault well into the matrix, providing no information about the secret key to the attacker. The performance evaluation proves that the proposed prevention method outperforms the others in terms of time, cost and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
46

R. Kalaiselvi and P. Meenakshi Sundaram. "Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks." Scientific Temper 15, no. 04 (2024): 3196–204. https://doi.org/10.58414/scientifictemper.2024.15.4.29.

Full text
Abstract:
Mobile ad hoc networks provide a substantial security threat because they lack central management and sufficient resources. These networks function autonomously without any central authority regulating the inclusion or removal of nodes. Nodes have the autonomy to choose when to join or quit. Dynamic multi-hop networks, either stationary or mobile, provide quick and simple access to data. Predicting the evolution of MANET can be challenging due to the network’s dispersion and self-organization, as well as its unpredictable and constantly changing topology. The independent organization of nodes in MANETs, coupled with their dispersion, may complicate the prediction of the network’s future growth due to its unstable and constantly changing structure. A Sybil attack, a deceptive tactic, involves a small number of individuals creating multiple counterfeit identities to gain dominance over a substantial portion of the system. To deceive legitimate users into believing that their system is utilizing their identities, the malicious attacker node adopts numerous identities. An attacker aims to gather a substantial number of node IDs, potentially generated at random, to appear and function as distinct nodes. Within the peer-to-peer overlay, the enemy can approach a single object or a group of objects by adopting different identities. Mobile ad hoc networks are intrinsically less secure than wired networks due to inherent security vulnerabilities and limited energy resources. To enhance detection accuracy, it is recommended to employ an ensemble regression arboretum model, which is a type of machine learning prediction model. This study proposes a machine learning-based method for detecting Sybil attacks in MANETs by collecting network metrics such as traffic characteristics, communication patterns, and node behaviors.
APA, Harvard, Vancouver, ISO, and other styles
47

Jiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang, and Yung Hoh Sheu. "JokerBot – An Android-Based Botnet." Applied Mechanics and Materials 284-287 (January 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.

Full text
Abstract:
Due to the trend that mobile devices are getting more and more popular, smart phone security becomes an important issue nowadays. This paper proposes an Android-based botnet, called JokerBot, to show the possible security problems in mobile devices. This paper describes JokerBot framework. JokerBot designs its own communication mechanism to allow different bots to communicate with each other. An attacker can use JokerBot to trigger many kinds of potential attacks, such as monitoring the SMS messages and location disclosure. Moreover, after a bot is created in a compromised smartphone, it is difficult to locate the botmaster and detect whether the smartphone is infected or not. Finally, this paper proposes some defense mechanisms to protect a smartphone against JokerBot attacks.
APA, Harvard, Vancouver, ISO, and other styles
48

Rani, Pooja, Kavita, Sahil Verma, et al. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (2021): 251. http://dx.doi.org/10.3390/s22010251.

Full text
Abstract:
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered one of the most affecting threats in the MANET in which the attacker node drops the entire data traffic and hence degrades the network performance. Therefore, it necessitates the designing of an algorithm that can protect the network from the BHA node. This article introduces Ad-hoc On-Demand Distance Vector (AODV), a new updated routing protocol that combines the advantages of the Artificial Bee Colony (ABC), Artificial Neural Network (ANN), and Support Vector Machine (SVM) techniques. The combination of the SVM with ANN is the novelty of the proposed model that helps to identify the attackers within the discovered route using the AODV routing mechanism. Here, the model is trained using ANN but the selection of training data is performed using the ABC fitness function followed by SVM. The role of ABC is to provide a better route for data transmission between the source and the destination node. The optimized route, suggested by ABC, is then passed to the SVM model along with the node’s properties. Based on those properties ANN decides whether the node is a normal or an attacker node. The simulation analysis performed in MATLAB shows that the proposed work exhibits an improvement in terms of Packet Delivery Ratio (PDR), throughput, and delay. To validate the system efficiency, a comparative analysis is performed against the existing approaches such as Decision Tree and Random Forest that indicate that the utilization of the SVM with ANN is a beneficial step regarding the detection of BHA attackers in the MANET-based IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
49

Lavrushkina, A. "Subject of fraud through the use of the network of Internet and means of mobile communication." Bulletin of Science and Practice 4, no. 3 (2018): 282–85. https://doi.org/10.5281/zenodo.1198758.

Full text
Abstract:
In this article, the subject&rsquo;s features are considered when committing fraud using the Internet and mobile communications. Guided by the typical schemes of fraudulent practices developed by the Ministry of Internal Affairs on the basis of investigative practice, the specific character of the attacker&#39;s behaviour is analyzed, on the basis of which his characteristic is given. The article also touches upon the victimological features of victims of such crimes, their author&#39;s classification is given.
APA, Harvard, Vancouver, ISO, and other styles
50

Jain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." Journal of Information Technology Research 12, no. 2 (2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.

Full text
Abstract:
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due to the massive growth of mobile users. The smishing message is very harmful since its target to financial benefits. In this article, the authors present a new feature-based approach to detect smishing messages in the mobile environment. This approach offers ten novel features that distinguish the fake messages from the ham messages. In this article, the authors have also identified the nineteen most suspicious keywords, which are used by the attacker to lure victims. This article has implemented these features on benchmarked dataset and applied numerous classification algorithms to judge the performance of the proposed approach. Experimental outcomes indicate that proposed approach can detect smishing messages with the 94.20% true positive rate and 98.74% overall accuracy. Furthermore, the proposed approach is very efficient for the detection of the zero hour attack.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography