B Bhushan, G Sahoo, AK Rai - 2017 3rd International …, 2017 - ieeexplore.ieee.org
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is a serious concern for many security professionals. The attackers target the actual data …
GN Nayak, SG Samaddar - 2010 3rd International Conference …, 2010 - ieeexplore.ieee.org
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS) …
U Meyer, S Wetzel - Proceedings of the 3rd ACM workshop on Wireless …, 2004 - dl.acm.org
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies …
IMSI catching is a problem on all generations of mobile telecommunication networks, ie, 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a …
A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is expected to grow in the next …
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its …
G Tuna, DG Kogias, VC Gungor, C Gezer… - Journal of Parallel and …, 2017 - Elsevier
Abstract Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M …
Abstract Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore …
SF Mjølsnes, RF Olimid - … Models, and Architectures for Computer Network …, 2017 - Springer
IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and …