Provably curb man-in-the-middle attack-based ARP spoofing in a local network

HI Nasser, MA Hussain - Bulletin of Electrical Engineering and …, 2022 - mail.beei.org
Even today, internet users' data security remains a significant concern. One problem is ARP
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …

A novel mechanism for detection of address resolution protocol spoofing attacks in large-scale software-defined networks

L Patrice, R Sinde, J Leo - IEEE Access, 2024 - ieeexplore.ieee.org
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no
clear remedy until now. The attacks can be launched easily utilizing an enormous number of …

[PDF][PDF] A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system

M Fareed, AA Yassin - International Journal of Electrical and …, 2023 - academia.edu
Wireless body area networks (WBANs) have lately been combined with different healthcare
equipment to monitor patients' health status and communicate information with their …

ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks

M Bhattacharya, S Roy, S Chattopadhyay… - IEEE Systems …, 2022 - ieeexplore.ieee.org
Over the last few years, with the massive growth of smartphone technology and mobile
Internet, the use of various online social networks (OSNs) have increased rapidly. This ever …

[PDF][PDF] Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.

NM Hamed, AA Yassin - Iraqi Journal for Electrical & Electronic Engineering, 2022 - iasj.net
Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare
Records (EHRs), networks, and cloud computing has transformed the traditional healthcare …

A secure mechanism for prevention of vishing attack in banking system

DRD Brabin, S Bojjagani - 2023 International conference on …, 2023 - ieeexplore.ieee.org
A vishing attack is a category of Phishing attack in which the attacker attempts to capture
clandestine information through a phone call or Short Message Service (SMS). These types …

[PDF][PDF] Server Side Method to Detect and Prevent Stored XSS Attack.

IF Khazal, MA Hussain - Iraqi Journal for Electrical & Electronic Engineering, 2021 - iasj.net
Abstract Cross-Site Scripting (XSS) is one of the most common and dangerous attacks. The
user is the target of an XSS attack, but the attacker gains access to the user by exploiting an …

Secure and Fast Remote Application–Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings

BM Radhi, MA Hussain, ZA Abduljabbar… - … in Information and …, 2024 - ieeexplore.ieee.org
The proliferation of the internet of things (IoT) has led to the emergence of a wide range of
intelligent devices, creating a broad domain with significant security concerns. These …

An Efficient Student Attendance Scheme Based On QR Code and Device Identifier

MH Hashim, HA Jasim - 2022 Iraqi International Conference on …, 2022 - ieeexplore.ieee.org
Recently, Smartphones are considered the most prevalent items utilized in our daily life. The
smartphone is used to quickly solve many problems, such as chatting, connecting to the …

A secure and authentication scheme to preserve the privacy of electronic health records in the healthcare system

NM Hamed, AA Yassin - 2022 Iraqi International Conference on …, 2022 - ieeexplore.ieee.org
Electronic Healthcare Records (EHRs), networks, and cloud computing have significantly
revolutionized the traditional healthcare system. Secure remote user authentication is an …