Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd

M Vanhoef, E Ronen - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
The WPA3 certification aims to secure home networks, while EAP-pwd is used by certain
enterprise Wi-Fi networks to authenticate users. Both use the Dragonfly handshake to …

On the robustness of Wi-Fi deauthentication countermeasures

D Schepers, A Ranganathan, M Vanhoef - Proceedings of the 15th ACM …, 2022 - dl.acm.org
With the introduction of WPA3 and Wi-Fi 6, an increased usage of Wi-Fi Management Frame
Protection (MFP) is expected. Wi-Fi MFP, defined in IEEE 802.11 w, protects robust …

Fragment and forge: breaking {Wi-Fi} through frame aggregation and fragmentation

M Vanhoef - 30th USENIX security symposium (USENIX Security 21 …, 2021 - usenix.org
In this paper, we present three design flaws in the 802.11 standard that underpins Wi-Fi.
One design flaw is in the frame aggregation functionality, and another two are in the frame …

Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …

[PDF][PDF] Security of distributed intelligence in edge computing: Threats and countermeasures

MS Ansari, SH Alsamhi, Y Qiao, Y Ye… - The Cloud-to-Thing …, 2020 - library.oapen.org
Rapid growth in the amount of data produced by IoT sensors and devices has led to the
advent of edge computing wherein the data is processed at a point at or near to its origin …

A Formal Analysis of {IEEE} 802.11's {WPA2}: Countering the Kracks Caused by Cracking the Counters

C Cremers, B Kiesl, N Medinger - 29th USENIX Security Symposium …, 2020 - usenix.org
The IEEE 802.11 WPA2 protocol is widely used across the globe to protect network
connections. The protocol, which is specified on more than three-thousand pages and has …

[HTML][HTML] Cybersecurity challenges for PACS and medical imaging

M Eichelberg, K Kleber, M Kämmerer - Academic Radiology, 2020 - Elsevier
Cybersecurity issues have been on the rise for years, increasingly affecting the healthcare
sector. In 2019, several attacks have been published that specifically aim at medical network …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …