An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack
Abstract
References
Index Terms
- An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack
Recommendations
A man-in-the-middle attack on UMTS
WiSe '04: Proceedings of the 3rd ACM workshop on Wireless securityIn this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber ...
Detection of man-in-the-middle attacks using physical layer wireless security techniques
Compared with a wired network, a wireless network is not protected by the cable transmission medium. Information is broadcasted over the air and it can be intercepted by anyone within the transmission range. Even though the transmissions could ...
Study on Man-in-the-Middle Attack and Defending Techniques in IPv6 Network
ICECC '12: Proceedings of the 2012 International Conference on Electronics, Communications and ControlAlthough widely deployed in recent years, the IPv6 protocols still have many security problems, especially the Man-In-The-Middle Attack in Local Area Network. This paper presents an IPv6 Man-In-The-Middle Attack test system to help user aware the ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 187Total Downloads
- Downloads (Last 12 months)187
- Downloads (Last 6 weeks)39
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in