Next Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Journal
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
 
 
Article
Peer-Review Record

Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

Cryptography 2018, 2(4), 38; https://doi.org/10.3390/cryptography2040038
by James Jin Kang 1,2,*, Kiran Fahd 1 and Sitalakshmi Venkatraman 1
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Cryptography 2018, 2(4), 38; https://doi.org/10.3390/cryptography2040038
Submission received: 9 November 2018 / Revised: 2 December 2018 / Accepted: 4 December 2018 / Published: 5 December 2018

Round 1

Reviewer 1 Report

I think the work is lack of related work. Please add more discussion into your revised version. Here is some suggestion you might refer to. 

"Leveraging emerging technology for hardware security-case study on silicon nanowire fets and graphene symfets"

"Tunnel fet current mode logic for dpa-resilient circuit designs"

"E2LEMI: Energy-Efficient Logic Encryption Using Multiplexer Insertion"

Author Response

Reviewer 1

Responses

I think the work is lack   of related work. Please add more discussion into your revised version. Here   is some suggestion you might refer to. 

"Leveraging emerging   technology for hardware security-case study on silicon nanowire fets and   graphene symfets"

"Tunnel fet current   mode logic for dpa-resilient circuit designs"

"E2LEMI:   Energy-Efficient Logic Encryption Using Multiplexer Insertion"

 

Thanks for the valuable comments and we added a paragraph with the   suggestion to the literature review.

 


Reviewer 2 Report

Authors proposed a verification model for attack detection for cybersecurity applications. There is an increasing risk for cyber-attacks that demands security mechanisms for protecting the information networks. Confidentiality and integrity is already present in SSL/TLS certificates. SSL dependence on correct authentication of servers that can become the reason for man-in-the-middle attacks. Existing technologies in this space have limitations such as operational complexity, deployment costs and adversarial attacks. Authors proposed a new scheme for detecting such attacks while minimizing the intervention and network load. Authors model consists of new decision scheme for detecting attacks/anomalies in transmission time at a trusted time server. It uses a time-based verification leveraging sent and received messages. In short, the proposed learning-based method provide a robust solution that enables automatic anomaly detection with trusted verification of the transmission time. MITM attacks happen even in presence of SSL/TSL authentication. Existing approach for detecting such attacks have limited limitations such as high implementation costs unlike proposed approach. The proposed approach is advantageous as it does not need require complex configurations and is inexpensive. The proposed inference procedure does not need modification in existing protocols. The results and discussions have shown the effectiveness of proposed approach in real-time deployment scenarios.

 

Authors articulated the proposed work and highlighted its importance in real-world applications. Results and conclusions are consistent with expectations. Future work and references included are reasonable for an acceptable journal paper. Paper is of acceptance quality.


Author Response

Reviewer 2

Response

Authors articulated the   proposed work and highlighted its importance in real-world applications.   Results and conclusions are consistent with expectations. Future work and   references included are reasonable for an acceptable journal paper. Paper is   of acceptance quality.

Thanks for the valuable feedback


Reviewer 3 Report

The authors propose an innovative method for detecting MITM attacks using transmission time-based verification along with a learning inference scheme.

The paper is well written.

The presented method and algorithm are clearly presented and the obtained results confirm their correctness.


Author Response

Reviewer 3

Response

The authors propose an   innovative method for detecting MITM attacks using transmission time-based   verification along with a learning inference scheme.

The paper is well written.

The presented method and   algorithm are clearly presented and the obtained results confirm their   correctness.

 

Thanks for the valuable feedback


Round 2

Reviewer 1 Report

accept

Back to TopTop