Softwarized IoT network immunity against eavesdropping with programmable data planes

G Liu, W Quan, N Cheng, D Gao, N Lu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
State-of-the-art mechanisms against eavesdropping first encrypt all packet payloads in the
application layer and then split the packets into multiple network paths. However, versatile …

P4NIS: Improving network immunity against eavesdropping with programmable data planes

G Liu, W Quan, N Cheng, N Lu… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Due to improving computational capacity of supercomputers, transmitting encrypted packets
via one single network path is vulnerable to brute-force attacks. The versatile attackers …

Learning based adaptive network immune mechanism to defense eavesdropping attacks

M Liu, D Gao, G Liu, J He, L Jin, C Zhou, F Yang - IEEE Access, 2019 - ieeexplore.ieee.org
Encryption mechanisms improve the security of transmitting data. Nevertheless, attackers
might silently eavesdrop packets to crack sensitive information or launch cyberattacks to …

IoT network security: requirements, threats, and countermeasures

A Hamza, HH Gharakheili, V Sivaraman - arXiv preprint arXiv:2008.09339, 2020 - arxiv.org
IoT devices are increasingly utilized in critical infrastructure, enterprises, and households.
There are several sophisticated cyber-attacks that have been reported and many networks …

[HTML][HTML] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

X Xu, H Hu, Y Liu, J Tan, H Zhang, H Song - Digital Communications and …, 2022 - Elsevier
Eavesdropping attacks have become one of the most common attacks on networks because
of their easy implementation. Eavesdropping attacks not only lead to transmission data …

Towards 5G-based IoT security analysis against Vo5G eavesdropping

S Kwon, S Park, HJ Cho, Y Park, D Kim, K Yim - Computing, 2021 - Springer
With the advent of 5G technology, the enhanced Mobile Broadband technology is translating
5G-based Internet of Things (IoT) such as smart home/building into reality. With such …

[PDF][PDF] Profiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames

IA Alharbi, AJ Almalki, M Alyami, C Zou… - Adv. Sci. Technol. Eng …, 2022 - cs.ucf.edu
The emerging smart infrastructures are integrated with the Internet of Things (IoT) devices
and their applications to make daily life easier for individuals and improve the public …

eeDTLS: Energy-efficient datagram transport layer security for the Internet of Things

U Banerjee, C Juvekar, SH Fuller… - … 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
In the fast growing world of the Internet of Things (IoT), security has become a major
concern. Datagram Transport Layer Security (DTLS) is considered to be one of the most …

Towards learning-automation IoT attack detection through reinforcement learning

T Gu, A Abhishek, H Fu, H Zhang… - 2020 IEEE 21st …, 2020 - ieeexplore.ieee.org
As a massive number of the Internet of Things (IoT) devices are deployed, the security and
privacy issues in IoT arouse more and more attention. The IoT attacks are causing …

IoT secure communication using ANN classification algorithms

TS Fatayer, MN Azara - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is state of the art technology of internet network that enables devices
in our life (eg, camera, and cars) to connect internet network and exchange data between …