Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

A neo-institutional perspective on the establishment of information security knowledge sharing practices

F Hassandoust, M Subasinghage… - Information & …, 2022 - Elsevier
Abstract Information security knowledge sharing (ISKS) among an organization's employees
is vital to the organization's ability to protect itself from any number of prevalent threats, yet …

Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)

AS Khan, Y Javed, J Abdullah, K Zen - Journal of Ambient Intelligence and …, 2021 - Springer
D2D communication is an integral part of LTE-Advance and 5G cellular networks, has
gained a lot of popularity in recent years as it offers high speed, extended coverage, and …

PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks

Q Lu, S Li, J Zhang, R Jiang - Computers & Security, 2022 - Elsevier
Over the past decade, the rogue access point (RAP) has been a persistent security threat in
IEEE 802.11 networks. By exploiting the vulnerability in the 802.11 family, an RAP can be …

BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks

Q Lu, R Jiang, Y Ouyang, H Qu, J Zhang - Computers & Security, 2020 - Elsevier
The evil twin attack (ETA) has been a persistent security threat for decades in wireless local
area networks (WLANs). An ETA refers to a rogue access point (RAP) impersonating a legal …

Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)

D Arisandi, NM Ahmad, S Kannan - Emerging Science Journal, 2025 - ijournalse.org
Abstract Rogue Access Points (RAPs) pose a significant security threat by mimicking
legitimate Wi-Fi networks and potentially compromising sensitive data. To address this …

[PDF][PDF] The rogue access point identification: A model and classification review

D DA Arisandi… - The Indonesian …, 2021 - pdfs.semanticscholar.org
Most people around the world make use of public Wi-Fi hotspots, as their daily routine
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …

Mobile Edge Computing: Security and Privacy Issues, Challenges and Countermeasures.

MZ Alam, S Ahmed, H Khan, MI Alam… - IUP Journal of …, 2022 - search.ebscohost.com
Abstract Mobile Edge Computing (MEC) is a novel technology that provides fast data
processing with efficiency on 5G networks. It can be propitious in Internet of Things (IoT) …

A robust certificate management system to prevent evil twin attacks in IEEE 802.11 networks

Y Daldoul, M Berrima - International Journal of Information Technology, 2024 - Springer
The evil twin attack is a major security threat to wireless local area networks (WLANs). An
evil twin is a rogue AP installed by a malicious user to impersonate legitimate Access Points …

Convolutional neural network based evil twin attack detection in WiFi networks

Y Tian, S Wang, L Zhang - MATEC Web of Conferences, 2021 - matec-conferences.org
Evil Twin Attack (ETA) refers to attackers use a device to impersonate a legitimate hotspot.
To address the problem of ETAs in the WiFi network, a Convolutional Neural Network (CNN) …