2017
DOI: 10.12709/fbim.05.05.02.03
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attacks and Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Several attacks and risks on the network layer are identified: Man-in-the-Middle (MITM) : According to McAfee [ 6 ], the most recurrent attacks are Denial of Service (DoS) and Man In the Browser (MITB) attacks. This latter, along with the Secure Socket Layer (SSL) attack, which enables attackers to listen to traffic, intercept it, and spoof both ends of the data, constitute the MITM attack [ 48 , 49 ]. Denial of Service (DoS) : This type of attacks occurs also at the network layer by jamming the transmission of radio signals, using a fake node, affecting the transmission or routing of data between nodes [ 50 , 51 ].…”
Section: Security Issues In Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Several attacks and risks on the network layer are identified: Man-in-the-Middle (MITM) : According to McAfee [ 6 ], the most recurrent attacks are Denial of Service (DoS) and Man In the Browser (MITB) attacks. This latter, along with the Secure Socket Layer (SSL) attack, which enables attackers to listen to traffic, intercept it, and spoof both ends of the data, constitute the MITM attack [ 48 , 49 ]. Denial of Service (DoS) : This type of attacks occurs also at the network layer by jamming the transmission of radio signals, using a fake node, affecting the transmission or routing of data between nodes [ 50 , 51 ].…”
Section: Security Issues In Iotmentioning
confidence: 99%
“…Man-in-the-Middle (MITM) : According to McAfee [ 6 ], the most recurrent attacks are Denial of Service (DoS) and Man In the Browser (MITB) attacks. This latter, along with the Secure Socket Layer (SSL) attack, which enables attackers to listen to traffic, intercept it, and spoof both ends of the data, constitute the MITM attack [ 48 , 49 ].…”
Section: Security Issues In Iotmentioning
confidence: 99%
“…The main types of IoT attacks are: (i) denial of service (DoS) attacks that can block the availability of IoT system or services so that the resources are completely exhausted; (ii) physical attacks that can tamper the device components bringing risks to the IoT systems; (iii) eavesdropping that can compromise confidentiality when there is unauthorized access of IoT end-nodes due to impersonation or man-in-the-middle (MITM) of a malicious entity in the IoT network [24]. In an MITM attack, the malicious user replaces the exchanged keys in the public key cryptosystem with its own key to establish a secure channel to gain access to private messages; (iv) access attacks that allow unauthorized entities to gain access to IoT systems or devices; and (v) other attacks, such as channel side attacks, firmware attacks, RAM attacks and ransomware.…”
Section: Iot Authentication Issues and Attacksmentioning
confidence: 99%
“…Such a secure communication channel can be used to share keys for lightweight cryptographic algorithms that are still very robust but require less computing power than the public key cryptosystems [22]. Hence, many algorithms to factor large numbers for attacking schemes such as RSA are gaining attention [23][24][25]. This motivates our research to identify the limitations of RSA-based lightweight block ciphers for IoT authentication requirements.…”
Section: Introductionmentioning
confidence: 99%
“…"Man in the middle" (MITM/MIM) is a kind of malware which relies on SSL/TSL protocol weakness, being correspondent in communication between two network users (Čekerevac et al, 2017;Mallik et al, 2019). In such a case, downloading of important data occurs while users can rarely detect it.…”
mentioning
confidence: 99%