[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

K Ramezanpour, J Jagannath, A Jagannath - Computer Networks, 2023 - Elsevier
Spectrum scarcity has been a major concern for achieving the desired quality of experience
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle

C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …

Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset

E Chatzoglou, G Kambourakis, C Kolias - IEEE Access, 2021 - ieeexplore.ieee.org
This work serves two key objectives. First, it markedly supplements and extends the well-
known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in …

“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

A robust two-factor user authentication scheme-based ECC for smart home in IoT

S Zou, Q Cao, C Wang, Z Huang, G Xu - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
The unprecedented proliferation of smart home together with wireless sensor networks has
enriched human's daily life. Inevitably, the smart home without the guard of authentication …

[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …