Skip Content
You are currently on the new version of our website. Access the old version .

220 Results Found

  • Article
  • Open Access
67 Citations
8,016 Views
11 Pages

27 July 2022

Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, and in Internet of Things (IoT) ecosystems. They are also anticipated to...

  • Article
  • Open Access
86 Citations
9,636 Views
19 Pages

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

  • Farhan Ahmad,
  • Asma Adnane,
  • Virginia N. L. Franqueira,
  • Fatih Kurugollu and
  • Lu Liu

20 November 2018

Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision...

  • Article
  • Open Access
10 Citations
6,466 Views
19 Pages

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

  • Ugochukwu Onyekachi Obonna,
  • Felix Kelechi Opara,
  • Christian Chidiebere Mbaocha,
  • Jude-Kennedy Chibuzo Obichere,
  • Isdore Onyema Akwukwaegbu,
  • Miriam Mmesoma Amaefule and
  • Cosmas Ifeanyi Nwakanma

21 August 2023

Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this...

  • Article
  • Open Access
1,021 Views
23 Pages

30 April 2025

As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to...

  • Article
  • Open Access
6 Citations
2,851 Views
23 Pages

We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systemat...

  • Article
  • Open Access
883 Views
19 Pages

27 August 2025

With the widespread adoption of intelligent electronic devices (IEDs) in smart substations, the real-time data transmission and interoperability features of the IEC 61850 communication standard play a crucial role in ensuring seamless automation syst...

  • Article
  • Open Access
14 Citations
5,879 Views
7 Pages

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

  • Tom Vergoossen,
  • Robert Bedington,
  • James A. Grieve and
  • Alexander Ling

10 April 2019

An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe f...

  • Article
  • Open Access
431 Views
21 Pages

Exploring Hardware Vulnerabilities in Robotic Actuators: A Case of Man-in-the-Middle Attacks

  • Raúl Jiménez Naharro,
  • Fernando Gómez-Bravo and
  • Rafael López de Ahumada Gutiérrez

14 December 2025

One of the main vulnerabilities in robotic systems lies in the communication buses that enable low-level controllers to interact with the actuators responsible for the robot’s movements. In this context, hardware attacks represent a significant...

  • Feature Paper
  • Article
  • Open Access
18 Citations
5,911 Views
17 Pages

Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study

  • Ondrej Pospisil,
  • Radek Fujdiak,
  • Konstantin Mikhaylov,
  • Henri Ruotsalainen and
  • Jiri Misurec

20 August 2021

The low-power wide-area (LPWA) technologies, which enable cost and energy-efficient wireless connectivity for massive deployments of autonomous machines, have enabled and boosted the development of many new Internet of things (IoT) applications; howe...

  • Article
  • Open Access
10 Citations
4,133 Views
14 Pages

The Internet of Things (IoT) necessitates secure and lightweight firmware over-the-air (FOTA) update mechanisms for remote device management and timely mitigation of security vulnerabilities. This study introduces an FOTA update method to mitigate ma...

  • Article
  • Open Access
2,519 Views
27 Pages

Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols

  • Siniša Tomović,
  • Milica Knežević and
  • Miodrag J. Mihaljević

8 March 2021

This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem. A recent...

  • Article
  • Open Access
1 Citations
2,282 Views
19 Pages

14 March 2025

The trend in self-tracking devices has remained unabated for years. Even if they record a large quantity of sensitive data, most users are not concerned about their data being transmitted and stored in a secure way from the device via the companion a...

  • Review
  • Open Access
153 Citations
15,189 Views
20 Pages

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects

  • Usman Inayat,
  • Muhammad Fahad Zia,
  • Sajid Mahmood,
  • Haris M. Khalid and
  • Mohamed Benbouzid

Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of exchanging data with other devices using the cloud or wireless networks. However, the changes and developments in the IoT environment are making IoT syst...

  • Article
  • Open Access
2 Citations
3,633 Views
17 Pages

Enhancing Security in International Data Spaces: A STRIDE Framework Approach

  • Nikola Gavric,
  • Andrii Shalaginov,
  • Aliaksei Andrushevich,
  • Andreas Rumsch and
  • Andrew Paice

The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange whi...

  • Article
  • Open Access
596 Views
32 Pages

23 August 2025

Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes. However, existing lightweight authentication protocols for IWSNs remain vulnerable to so...

  • Article
  • Open Access
1,044 Views
32 Pages

Formal Analysis of EAP-TLS Protocol Based on Logic of Events

  • Meihua Xiao,
  • Weili Cheng,
  • Hongming Fan,
  • Huaibin Shao,
  • Zehuan Li and
  • Yingqiang Zhong

4 September 2025

The Extensible Authentication Protocol–Transport Layer Security (EAP-TLS) is a critical authentication protocol for wireless networks and secure IoT communications. However, it faces significant challenges from man-in-the-middle attacks, includ...

  • Article
  • Open Access
11 Citations
4,458 Views
16 Pages

An Efficient Framework for Securing the Smart City Communication Networks

  • Faisal Abdulaziz Alfouzan,
  • Kyounggon Kim and
  • Nouf M. Alzahrani

15 April 2022

Recently, smart cities have increasingly been experiencing an evolution to improve the lifestyle of citizens and society. These emerge from the innovation of information and communication technologies (ICT) which are able to create a new economic and...

  • Article
  • Open Access
28 Citations
5,374 Views
13 Pages

Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computationa...

  • Article
  • Open Access
6 Citations
2,887 Views
10 Pages

29 January 2021

We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no dis...

  • Article
  • Open Access
20 Citations
4,618 Views
16 Pages

17 December 2023

In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices t...

  • Article
  • Open Access
44 Citations
7,893 Views
13 Pages

Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5

  • Shaik Mullapathi Farooq,
  • S. M. Suhail Hussain,
  • Siddavaram Kiran and
  • Taha Selim Ustun

Smart grids are becoming increasingly popular thanks to their ability to operate with higher precision and smaller margins. Dynamic operation control in smart grids can be achieved with phasor measurement unit (PMU) based wide area monitoring and con...

  • Article
  • Open Access
14 Citations
9,428 Views
20 Pages

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability&mdas...

  • Article
  • Open Access
7 Citations
6,078 Views
36 Pages

18 March 2025

Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, p...

  • Review
  • Open Access
22 Citations
14,974 Views
26 Pages

28 September 2019

Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its st...

  • Article
  • Open Access
5 Citations
2,420 Views
23 Pages

Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

  • Ali Saeed Almuflih,
  • Khushi Popat,
  • Viral V. Kapdia,
  • Mohamed Rafik Noor Mohamed Qureshi,
  • Naif Almakayeel and
  • Rabia Emhamed Al Mamlook

27 July 2022

Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the d...

  • Article
  • Open Access
533 Views
25 Pages

Position Spoofing Attacks on Unmanned Surface Vehicles

  • Jia Wang,
  • Yang Xiao,
  • Tieshan Li and
  • Philip C. L. Chen

28 November 2025

Unmanned surface vehicles (USVs) are equipped with numerous sensors, and data is transmitted through networks. Attackers may remotely compromise unmanned surface vehicle (USV) systems and commit criminal acts via networks, causing USVs to deviate fro...

  • Article
  • Open Access
11 Citations
7,466 Views
32 Pages

8 June 2015

Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authenticati...

  • Article
  • Open Access
13 Citations
3,338 Views
21 Pages

2 August 2023

The networks on a centralized cloud architecture that interconnect Internet of Things (IoT) gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of sensitive user data among IoT gadgets, it is imperative to main...

  • Article
  • Open Access
6 Citations
4,089 Views
16 Pages

8 December 2017

With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper...

  • Article
  • Open Access
20 Citations
6,276 Views
15 Pages

Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment

  • Zakariae Belghazi,
  • Nabil Benamar,
  • Adnane Addaim and
  • Chaker Abdelaziz Kerrache

2 December 2019

With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. Ho...

  • Article
  • Open Access
303 Views
16 Pages

31 December 2025

One of the main sources of entertainment is live video streaming platforms, which allow viewers to watch video streams in real time. However, because of the increasing demand for high quality content, the vulnerability of streaming systems against cy...

  • Article
  • Open Access
2 Citations
3,767 Views
19 Pages

SoK: A Reality Check for DNP3 Attacks 15 Years Later

  • Juan David Parra Rodriguez,
  • Kwasi Boakye-Boateng,
  • Ratinder Kaur,
  • Allyson Zhou,
  • Rongxing Lu and
  • Ali A. Ghorbani

14 December 2024

OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers. We assess the applicability of attacks previously published from theoretical and practical poi...

  • Article
  • Open Access
5 Citations
2,731 Views
14 Pages

11 December 2024

Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities. To enhance the security of industrial control systems, recent r...

  • Article
  • Open Access
8 Citations
2,255 Views
14 Pages

Semi-Quantum Identification without Information Leakage

  • Chun-Wei Yang,
  • Hung-Wen Wang,
  • Jason Lin and
  • Chia-Wei Tsai

14 January 2023

In 2019, Zhou et al. proposed semi-quantum identification (also known as semi-quantum authentication, SQA), which proceeds under a measure-resend and measurement-free environment. However, Zhou et al.’s SQA protocol suffers from severe informat...

  • Feature Paper
  • Article
  • Open Access
2 Citations
3,304 Views
27 Pages

Denial of Service Attack Prevention and Mitigation for Secure Access in IoT GPS-based Intelligent Transportation Systems

  • Gheorghe Romeo Andreica,
  • George Lucian Tabacar,
  • Daniel Zinca,
  • Iustin Alexandru Ivanciu and
  • Virgil Dobrota

The widespread use of GPS tracking devices has made them an indispensable solution in various sectors such as transportation, logistics, and security. However, the complexity of cyber attacks such as denial of service (DoS) attacks have made these de...

  • Article
  • Open Access
2 Citations
1,497 Views
19 Pages

8 March 2024

In the advanced metering infrastructure (AMI), impersonation, eavesdropping, man-in-the-middle and other attacks occur in the process of communication between entities through public channels, which will lead to the leakage of user privacy or the inc...

  • Article
  • Open Access
503 Views
25 Pages

16 October 2025

In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protoc...

  • Article
  • Open Access
51 Citations
5,417 Views
15 Pages

An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones

  • Sana Javed,
  • Muhammad Asghar Khan,
  • Ako Muhammad Abdullah,
  • Amjad Alsirhani,
  • Abdullah Alomari,
  • Fazal Noor and
  • Insaf Ullah

20 September 2022

The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the o...

  • Article
  • Open Access
8 Citations
3,137 Views
19 Pages

12 August 2022

Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether a device is being control-flow hijacked by launching a challenge–response process. In the growing landsca...

  • Article
  • Open Access
948 Views
17 Pages

Ethernet Passive Mutual Authentication Scheme on Quantum Networks

  • Jianuo Tian,
  • Panke Qin,
  • Zongqu Zhao and
  • Baodong Qin

27 January 2025

In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant. This paper proposes...

  • Article
  • Open Access
8 Citations
8,663 Views
31 Pages

Single sign-on (SSO) techniques allow access control for multiple systems with a single login. The aim of our study is to construct an authentication algorithm that provides the authentication information of a user to a requester without requiring an...

  • Article
  • Open Access
10 Citations
4,666 Views
24 Pages

Federated Learning-Based Predictive Traffic Management Using a Contained Privacy-Preserving Scheme for Autonomous Vehicles

  • Tariq Alqubaysi,
  • Abdullah Faiz Al Asmari,
  • Fayez Alanazi,
  • Ahmed Almutairi and
  • Ammar Armghan

12 February 2025

Intelligent Transport Systems (ITSs) are essential for secure and privacy-preserving communications in Autonomous Vehicles (AVs) and enhance facilities like connectivity and roadside assistance. Earlier research models used for traffic management com...

  • Article
  • Open Access
16 Citations
3,570 Views
20 Pages

Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

  • JoonYoung Lee,
  • SungJin Yu,
  • MyeongHyun Kim,
  • YoungHo Park,
  • SangWoo Lee and
  • BoHeung Chung

9 September 2020

With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as larg...

  • Article
  • Open Access
10 Citations
2,438 Views
9 Pages

Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States

  • Chun-Wei Yang,
  • Jason Lin,
  • Chia-Wei Tsai and
  • Ching-Lin Cheng

1 October 2022

Recently, Zhao et al. proposed a semi-quantum bi-signature (SQBS) scheme based on W states with two quantum signers and just one classical verifier. In this study, we highlight three security issues with Zhao et al.’s SQBS scheme. In Zhao et al...

  • Article
  • Open Access
2 Citations
3,377 Views
9 Pages

A Private Quantum Bit String Commitment

  • Mariana Gama,
  • Paulo Mateus and
  • André Souto

27 February 2020

We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property...

  • Article
  • Open Access
6 Citations
6,613 Views
19 Pages

An Improvement on Remote User Authentication Schemes Using Smart Cards

  • Chin-Ling Chen,
  • Yong-Yuan Deng,
  • Yung-Wen Tang,
  • Jung-Hsuan Chen and
  • Yu-Fan Lin

In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line passwor...

  • Article
  • Open Access
1 Citations
3,309 Views
17 Pages

Users encounter various threats, such as cross-site scripting attacks and session hijacking, when they perform login operations in the browser. These attacks pose significant risks to the integrity and confidentiality of personal data. The browser fi...

  • Article
  • Open Access
2 Citations
1,541 Views
20 Pages

19 August 2024

In the current 5G vehicle network system, there are security issues such as wireless intrusion, privacy leakage, and remote control. To address these challenges, an improved lightweight anonymous authentication key negotiation scheme based on certifi...

  • Article
  • Open Access
5 Citations
2,801 Views
16 Pages

9 May 2023

This work presents an efficient and effective system allowing hospitals to share patients’ private information while ensuring that each hospital database’s medical records will not be leaked; moreover, the privacy of patients who access t...

  • Article
  • Open Access
1 Citations
1,982 Views
17 Pages

11 August 2025

Distributed digital identity is an emerging identity management technology aimed at achieving comprehensive interconnectivity between digital objects. However, there is still the problem of privacy leakage in distributed identities, and selective dis...

of 5