A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Man-in-the-middle attack in wireless and computer networking—A review

B Bhushan, G Sahoo, AK Rai - 2017 3rd International …, 2017 - ieeexplore.ieee.org
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is
a serious concern for many security professionals. The attackers target the actual data …

Different flavours of man-in-the-middle attack, consequences and feasible solutions

GN Nayak, SG Samaddar - 2010 3rd International Conference …, 2010 - ieeexplore.ieee.org
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer
based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS) …

A man-in-the-middle attack on UMTS

U Meyer, S Wetzel - Proceedings of the 3rd ACM workshop on Wireless …, 2004 - dl.acm.org
In this paper we present a man-in-the-middle attack on the Universal Mobile
Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies …

Defeating IMSI catchers

F Van Den Broek, R Verdult, J De Ruiter - Proceedings of the 22Nd ACM …, 2015 - dl.acm.org
IMSI catching is a problem on all generations of mobile telecommunication networks, ie, 2G
(GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a …

M2M security: Challenges and solutions

A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …

[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …

A survey on information security threats and solutions for Machine to Machine (M2M) communications

G Tuna, DG Kogias, VC Gungor, C Gezer… - Journal of Parallel and …, 2017 - Elsevier
Abstract Although Machine to Machine (M2M) networks allow the development of new
promising applications, the restricted resources of machines and devices in the M2M …

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions

A Akhunzada, M Sookhak, NB Anuar, A Gani… - Journal of Network and …, 2015 - Elsevier
Abstract Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model,
and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore …

Easy 4G/LTE IMSI catchers for non-programmers

SF Mjølsnes, RF Olimid - … Models, and Architectures for Computer Network …, 2017 - Springer
IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access
networks, with disruptive effects to both the communication services and the trust and …