A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks

C Lai, H Li, R Lu, XS Shen - Computer Networks, 2013 - Elsevier
Abstract To support Evolved Packet System (EPS) in the Long Term Evolution (LTE)
networks, the 3rd Generation Partnership Project (3GPP) has proposed an authentication …

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

C Lai, R Lu, D Zheng, H Li, XS Shen - Computer Networks, 2016 - Elsevier
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …

Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks

J Li, M Wen, T Zhang - IEEE Internet of Things Journal, 2015 - ieeexplore.ieee.org
Machine type communication (MTC) is an important mobile communication approach in the
long-term evaluation-advanced (LTE-A) networks. To meet the MTC security requirements …

A secure and effective anonymous authentication scheme for roaming service in global mobility networks

D Zhao, H Peng, L Li, Y Yang - Wireless Personal Communications, 2014 - Springer
Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed an enhanced
anonymous authentication scheme for roaming service in global mobility networks …

A novel group access authentication and key agreement protocol for machine‐type communication

C Lai, H Li, X Li, J Cao - Transactions on emerging …, 2015 - Wiley Online Library
Abstract Machine‐to‐machine communications have been actively engaged in by the
standardisation and industry areas, also defined as machine‐type communication (MTC) in …

Lightweight batch AKA scheme for user-centric ultra-dense networks

Y Yao, X Chang, J Mišić… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Ultra-dense networks (UDN) are considered as one of the key technologies for advancing
the widespread deployment of 5G networks. To provide continuous and reliable connectivity …

PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

BL Parne, S Gupta, NS Chaudhari - Peer-to-Peer Networking and …, 2019 - Springer
In the mobile telecommunication network, Long term Evolution (LTE) is the most successful
technological development for the industrial services and applications. The Evolved Packet …

S-AKA: A provable and secure authentication key agreement protocol for UMTS networks

YL Huang, CY Shen, SW Shieh - IEEE transactions on …, 2011 - ieeexplore.ieee.org
The authentication and key agreement (AKA) protocol of Universal Mobile
Telecommunication System (UMTS), which is proposed to solve the vulnerabilities found in …