2022
DOI: 10.11591/eei.v11i4.3810
|View full text |Cite
|
Sign up to set email alerts
|

Provably curb man-in-the-middle attack-based ARP spoofing in a local network

Abstract: Even today, internet users’ data security remains a significant concern. One problem is ARP poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the identified ARP protocol vulnerability. Despite no straightforward remedy for ARP spoofing being apparent, certain actions may be taken to maintain one’s safety. The most basic and common defence against a poisoning attack is manually adding MAC and IP addresses to the static ARP cache table. However, this solution is ineffective f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
(22 reference statements)
0
2
0
Order By: Relevance
“… ISSN: 2088-8708 − Attack resistance: Any malicious attack like the man-in-the-middle (MITM) attack [46], impersonation attack, insider attack, and replay attack is possible if a CK adversary finds a method to carry out the attack. For an impersonation attack related to mutual authentication, the attacker should learn the firstfactor message (𝐻′, 𝑇) and confirmation code (𝐶𝐶) to masquerade as 𝑃 𝑖 and 𝐻𝐶𝐶 respectively.…”
Section: Informal Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“… ISSN: 2088-8708 − Attack resistance: Any malicious attack like the man-in-the-middle (MITM) attack [46], impersonation attack, insider attack, and replay attack is possible if a CK adversary finds a method to carry out the attack. For an impersonation attack related to mutual authentication, the attacker should learn the firstfactor message (𝐻′, 𝑇) and confirmation code (𝐶𝐶) to masquerade as 𝑃 𝑖 and 𝐻𝐶𝐶 respectively.…”
Section: Informal Security Analysismentioning
confidence: 99%
“…After reviewing the security challenges using the CK model, we compare our proposed system with similar works as shown in Table 2. 9𝑇 ℎ + 2𝑇 𝑏𝑝 + 2𝑇 𝑠𝑦𝑚 + 5𝑇 𝑒𝑐𝑐 51.51 [35] 14𝑇 ℎ + 2𝑇 𝑠𝑦𝑚 + 4𝑇 𝑒𝑐𝑐 18.64 [38] 11𝑇 ℎ 0.88 [39] 10𝑇 ℎ 0.8 [40] 10𝑇 ℎ 0.8 [46] 14𝑇 ℎ 1.12 Proposed 2𝑇 𝑆𝑖𝑔𝑛 +2𝑇 𝑉𝑒𝑟𝑖𝑓𝑦 0.35…”
Section: Informal Security Analysismentioning
confidence: 99%
“…In this type of attack, an adversary is intended to be able to intercept messages transferred between users and the server. When the user signs out of the server, he then utilizes this message [25]. The factors are delivered to the service provider securely encrypted in our suggested approach.…”
mentioning
confidence: 99%