Taxonomy and future threat of rogue access point for wireless network

KC Patel, A Patel - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …

a novel approach for an automated advanced MITM attack on IoT networks

K Kaushik, V Singh, VP Manikandan - International Conference on …, 2022 - Springer
Abstract Man-in-the-middle (MITM) attacks target any insufficiently protected contact
between two entities, whether it's a data transfer between two parties or an interaction …

An Efficient and Dependable UAV-Assisted Code Dissemination in 5G-Enabled Industrial IoT

R Sharma, B Villányi - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has infiltrated our culture and is gaining traction in a
variety of industrial applications. All of this is made possible by the use of 5G-connected …

Attack models and countermeasures for autonomous vehicles

MC Chow, M Ma, Z Pan - Intelligent Technologies for Internet of Vehicles, 2021 - Springer
With the rapid development of smart transportation, autonomous vehicles (AVs) are
becoming one of the most anticipating means of transport. However, as the complexity of …

HC-TUS: Human Cognition-Based Trust Update Scheme for AI-Enabled VANET

W Fang, C Zhu, M Guizani, JJPC Rodrigues… - IEEE …, 2023 - ieeexplore.ieee.org
Recently, Artificial Intelligence (AI) has received more attention for being used in many
applications. It is expected to play a key role in Vehicular Ad Hoc Networks (VANET). On the …

Research on Cyber Attacks and Defensive Measures of Power Communication Network

Y Wu, Y Ru, Z Lin, C Liu, T Xue… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the wide application of information and communication technologies, a great number of
cyber vulnerabilities threaten the security and stability of the power system. Therefore, this …

Decentralized reputation model based on bayes' theorem in vehicular networks

M Najafi, L Khoukhi, M Lemercier - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Vehicular Ad hoc Network (VANET) is a wireless technology dedicated to vehicular
communications. VANET is unsecure because of its lack of central administration and is also …

A new hybrid online and offline multi-factor cross-domain authentication method for iot applications in the automotive industry

H Khalid, SJ Hashim, SMS Ahmad, F Hashim… - Energies, 2021 - mdpi.com
Connected vehicles have emerged as the latest revolution in the automotive industry,
utilizing the advent of the Internet of Things (IoT). However, most IoT-connected cars …

[PDF][PDF] Research on 5G Core Network Trust Model Based on NF Interaction Behavior.

Y Zhu, C Liu, Y Zhang, W You - KSII Transactions on Internet & Information …, 2022 - itiis.org
Abstract The 5G Core Network (5GC) is an essential part of the mobile communication
network, but its security protection strategy based on the boundary construction is difficult to …

A taxonomy on man-in-the-middle attack in IoT network

D Panda, BK Mishra, K Sharma - 2022 4th International …, 2022 - ieeexplore.ieee.org
Recent trends in IoT networks suggests that the more the use of IoT devices, the more the
threat to the network. There are various threats posed by the attackers on this type of …