Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …

Non-pharmaceutical interventions against COVID-19 pandemic: Review of contact tracing and social distancing technologies, protocols, apps, security and open …

UR Alo, FO Nkwo, HF Nweke, II Achi, HA Okemiri - Sensors, 2021 - mdpi.com
The COVID-19 Pandemic has punched a devastating blow on the majority of the world's
population. Millions of people have been infected while hundreds of thousands have died of …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

[HTML][HTML] Automatic verification and execution of cyber attack on iot devices

FL Færøy, MM Yamin, A Shukla, B Katt - Sensors, 2023 - mdpi.com
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …

A first look at wi-fi 6 in action: Throughput, latency, energy efficiency, and security

R Liu, N Choi - Proceedings of the ACM on Measurement and Analysis …, 2023 - dl.acm.org
This paper presents a first-of-its-kind performance measurement of Wi-Fi 6 (IEEE 802.11 ax)
using real experiments. Our experiments focus on multi-client scenarios. The results reveal …

Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects

X Feng, Q Li, K Sun, Y Yang… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Modern Wi-Fi networks are commonly protected by the security mechanisms, eg, WPA,
WPA2 or WPA3, and thus it is difficult for an attacker (a malicious supplicant) to hijack the …

Wireless local area networks threat detection using 1D-CNN

M Natkaniec, M Bednarz - Sensors, 2023 - mdpi.com
Wireless Local Area Networks (WLANs) have revolutionized modern communication by
providing a user-friendly and cost-efficient solution for Internet access and network …

Framing Frames: Bypassing {Wi-Fi} Encryption by Manipulating Transmit Queues

D Schepers, A Ranganathan, M Vanhoef - 32nd USENIX Security …, 2023 - usenix.org
Wi-Fi devices routinely queue frames at various layers of the network stack before
transmitting, for instance, when the receiver is in sleep mode. In this work, we investigate …

A tutorial on next generation heterogeneous IoT networks and node authentication

K Sood, S Yu, DDN Nguyen, Y Xiang… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The extreme heterogeneity in Internet of Things (IoT) networks impacts the network
performance, application service quality, and user experience, and has opened many vistas …