Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
4,999 result(s) for "Impersonations"
Sort by:
A secure authentication scheme for VANETs with batch verification
Vehicular Ad-hoc Networks (VANETs) will start becoming deployed within the next decade. Among other benefits, it is expected that VANETs will support applications and services targeting the increase of safety on the road, and assist in improving the efficiency of the road transportation network. However, several serious challenges remain to be solved before efficient and secure VANET technology becomes available, one of them been efficient authentication of messages in a VANET. In this paper, we analyse a recent authentication scheme for VANETs introduced by Lee et al. Unfortunately this scheme is vulnerable to the impersonation attack so that a malicious user can generate a valid signature on behalf of the other vehicles. Based on the attack, we propose an improved scheme and introduce a simulation expressing the efficiency of the proposed scheme.
Design and analysis of data link impersonation attack for wired LAN application layer services
Impersonation attack, also known as MAC spoofing, is widespread in wireless local area networks. Under this attack, the senders cannot control the device that listens to their traffic. On the other hand, the physical layer of the wired local area network is more secure, where the traffic is transmitted through cables and network nodes to the intended receivers. Each network node builds its MAC address table, which states stations that are physically connected (directly or indirectly) to each port, so traffic encryption is an unnecessary process. This paper discusses the design and testing of a new attack called a data link impersonation attack. In this attack, the attacker is considered a hardware intruder that deceives data link layer apparatus like the switches of layer two or three, taking advantage of a vulnerability in the MAC address table of the network nodes. That leads the network switches to send all the network traffic to the intruder instead of the real network device (usually a network service provider under attack). Intruder accepts all incoming requests/traffic from the service requester. If the intruder does not reply to the received requests sent by service requesters, it acts as a black hole intruder, simply causing a denial-of-service attack. If an intruder responds to these requests with fake replies to steal information from service requesters, it acts as a white hole intruder. During the attack, the intruder is transparent for the whole network and does not affect overall network performance and generally the network services, so it is so hard to be discovered by the network software running the network apparatus. Different scenarios were tested using different network simulators and physical networks (CISCO L2/L3 switches). It is demonstrated that the attacker is successfully denied the service/application under attack. The proposed attack reveals the new vulnerability of the wired local area network and opens the door for network scientists to enhance network software that runs the network apparatus immune against the proposed attack.
An improved and provably secure privacy preserving authentication protocol for SIP
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1–8, 2014 ) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1–10, 2014 ) points out that Tu et al.’s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.’s scheme. However, our analysis in this paper shows that Tu et al.’s scheme is insecure against server impersonation attack. Further both Tu et al.’s scheme and Farash’s improvement do not protect user’s privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
Uncovering Hidden Histories of Adapting Jane Austen
THE HIDDEN HISTORY OF JANE AUSTEN'S \"THE VOLUBLE LADY\" Most sources (including my own book) claim that dramatic adaptations of Austen's fiction began with Rosina Filippi's Duologues and Scenes from the Novels of Jane Austen, Arranged and Adapted for Drawing-Room Performance (Looser; Cano 15; Bolton; Gilson). Half-Hours appeared in serialized form, in weekly parts that could be bound together, then in multi-volume books. Thanks to its circulation in Knight's Half-Hours, this excerpt came to be valued as a stand-alone, broadly comic interlude, known by perhaps millions of readers. Copycat editors lifted Knight's selections wholesale in competing books, down to recycling his made-up title (Lindo; Major; Former; Gilbart 261).
Who Pays the Price? Liability for Impersonation Fraud under Existing and Proposed Payment Rules in Europe
Impersonation fraud in payment services is a growing concern as fraudulent techniques continuously evolve, adapting to new security measures and regulatory frameworks. The increasing number of fraud cases highlights the need for a robust and clear liability regime. This article examines the current and proposed regulatory approaches in the Directive (EU) 2015/2366 of the European Parliament and of the Council of 25 November 2015 on payment services in the internal market (PSD2) and in the Proposal for a Regulation of the European Parliament and of the Council on payment services in the internal market (PSR Proposal), focusing on the rights and obligations of each party in the payment services contract, as well as the specific liability rules that apply to non-authorised payment transactions. These rules consist of the allocation of responsibility between provider and user based on the fulfilment of their obligations. After analysing these aspects, the article explores key open questions and assesses whether the proposed regulatory framework is capable of providing definitive solutions or if uncertainties will persist.
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important. To address these issues, the existing Conditional Privacy-Preserving Authentication (CPPA) schemes based on either public key infrastructure, group signature, or identity have been proposed. However, an attacker could impersonate an authenticated node in these schemes for broadcasting fake messages. Besides, none of these schemes have satisfactorily addressed the performance efficiency related to signing and verifying safety traffic-related messages. For resisting impersonation attacks and achieving better performance efficiency, a Secure and Efficient Conditional Privacy-Preserving Authentication (SE-CPPA) scheme is proposed in this paper. The proposed SE-CPPA scheme is based on the cryptographic hash function and bilinear pair cryptography for the signing and verifying of messages. Through security analysis and comparison, the proposed SE-CPPA scheme can accomplish security goals in terms of formal and informal analysis. More precisely, to resist impersonation attacks, the true identity of the vehicle stored in the tamper-proof device (TPD) is frequently updated, having a short period of validity. Since the MapToPoint hash function and a large number of cryptography operations are not employed, simulation results show that the proposed SE-CPPA scheme outperforms the existing schemes in terms of computation and communication costs. Finally, the proposed SE-CPPA scheme reduces the computation costs of signing the message and verifying the message by 99.95% and 35.93%, respectively. Meanwhile, the proposed SE-CPPA scheme reduces the communication costs of the message size by 27.3%.
Destabilizing Impersonation, Cleaving Gender Non-conformity: Akshayambara and Lady Anandi
This article offers an analysis of two theatrical productions that have graced the proscenium stage in India by utilizing an intersectional axis privileging gender nonconformity. It situates the destabilization of the category of impersonation, and the consequences that such a cleaving in theatricality effects on the public sphere. First, we look at Sharanya Ramprakash’s wildly popular play Akshayambara that draws on the traditional genre of Yakshagana whilst mediating and troubling binarizations of gender, class and caste. The second, Anuja Ghosalkar’s meditative documentary theatre production Lady Anandi, takes on an intimate rendition of the archive of her personal legacy as steeped in colonial theatre practice—of “female” impersonation on the colonial Bombay stage.
Fourth-Century Fakes
Although Gaius Julius Victor has attracted scholarly attention due to his inclusion of letter-writing in his fourth-century rhetorical manual, his peculiar notion of sermocinatio or “impersonation” has gone largely unnoticed. Set against the backdrop of earlier accounts of sermocinatio as a technique of the grand style—including accounts in Quintilian and Cicero—Julius Victor presents impersonation as a method of subtle eloquence most germane to plain-style rubrics. Given Julius Victor’s coupling of sermocinatio and letter-writing, too, his manual suggests that the ascending importance of writing tracks this stylistic reorientation, anticipating our own era’s evolving media and techniques for impersonating others.
Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection
The rapid advancement of technologies has enabled businesses to carryout their activities seamlessly and revolutionised communications across the globe. There is a significant growth in the amount and complexity of Internet of Things devices that are deployed in a wider range of environments. These devices mostly communicate through Wi-Fi networks and particularly in smart environments. Besides the benefits, these devices also introduce security challenges. In this paper, we investigate and leverage effective feature selection techniques to improve intrusion detection using machine learning methods. The proposed approach is based on a centralised intrusion detection system, which uses the deep feature abstraction, feature selection and classification to train the model for detecting the malicious and anomalous actions in the traffic. The deep feature abstraction uses deep learning techniques of artificial neural network in the form of unsupervised autoencoder to construct more features for the traffic. Based on the availability of cumulative features, the system then employs a variety of wrapper-based feature selection techniques ranging from SVM and decision tree to Naive Bayes for selecting high-ranked features, which are then combined and fed into an artificial neural network classifier for distinguishing attack and normal behaviors. The experimental results reveal the effectiveness of the proposed method on Aegean Wi-Fi Intrusion Dataset, which achieves high detection accuracy of up to 99.95%, relatively competitive to the existing machine learning works for the same dataset.