a novel approach for an automated advanced MITM attack on IoT networks

K Kaushik, V Singh, VP Manikandan - International Conference on …, 2022 - Springer
Abstract Man-in-the-middle (MITM) attacks target any insufficiently protected contact
between two entities, whether it's a data transfer between two parties or an interaction …

Man-in-the-middle attack in wireless and computer networking—A review

B Bhushan, G Sahoo, AK Rai - 2017 3rd International …, 2017 - ieeexplore.ieee.org
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is
a serious concern for many security professionals. The attackers target the actual data …

A review on attack in wireless and computer networking

T Mehrotra - Asian Journal of Multidimensional Research, 2021 - indianjournals.com
The Man-In-The-Middle attack is one of the most widely discussed assaults in computer
security, and it is a significant worry for many security experts. The attackers are after the …

Detection and mitigation of man-in-the-middle attack in IoT through alternate routing

K Saritha, V Sarasvathi, A Singh… - 2022 6th …, 2022 - ieeexplore.ieee.org
The Internet of Things has grown to great heights in recent years. More and more devices
are being connected to the Internet and the data from these IoT devices is used in decision …

Security challenges and attacks in MANET-IoT systems

SV Simpson, G Nagarajan - Enterprise Digital Transformation, 2022 - taylorfrancis.com
Communication technology has become the primary necessity of the world. The wide
acceptance of digital communication technology is mainly due to its transparent nature. After …

A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

IoT and Man-in-the-Middle Attacks

H Fereidouni, O Fadeitcheva, M Zalai - arXiv preprint arXiv:2308.02479, 2023 - arxiv.org
This paper provides an overview of the Internet of Things (IoT) and its significance. It
discusses the concept of Man-in-the-Middle (MitM) attacks in detail, including their causes …

A Taxonomy on Man-in-the-Middle Attack in IoT Network

D Panda, BK Mishra, K Sharma - 2022 4th International …, 2022 - ieeexplore.ieee.org
Recent trends in IoT networks suggests that the more the use of IoT devices, the more the
threat to the network. There are various threats posed by the attackers on this type of …

Insider attacks on Zigbee based IoT networks by exploiting AT commands

WA Piracha, M Chowdhury, B Ray… - … and Techniques in …, 2019 - Springer
This paper has presented three insiders attacks on Zigbee protocol–a protocol used for
wireless communication for the Internet of Thing (IoT) devices. The end-user's …

Reducing the attack surface of edge computing IoT networks via hybrid routing using dedicated nodes

JJ Kang, LF Sikos, W Yang - Secure Edge Computing, 2021 - taylorfrancis.com
Network bandwidth capacity and processing performances have increased due to the
increasing availability of affordable, expandable and energy-efficient networking …