A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
[article]
2021
arXiv
pre-print
that are offloaded to the data plane. ...
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. ...
Additionally, schemes should mitigate against stealthy, slow DDoS attacks.
XII. ...
arXiv:2102.00643v2
fatcat:izxi645kozdc5ibfsqp2y2foau
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
2021
IEEE Access
that are offloaded to the data plane. ...
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. ...
Additionally, schemes should mitigate against stealthy, slow DDoS attacks.
XII. ...
doi:10.1109/access.2021.3086704
fatcat:2jgbxj2cbfbp7fawkxwrztbbia
De-anonymisation attacks on Tor: A Survey
2021
IEEE Communications Surveys and Tutorials
Relay cells carry endto-end data and consist of an additional relay header. ...
The relay command can be relay data, relay begin, relay end, relay teardown, relay connected, relay extend, relay extended, relay truncate, relay truncated, or relay sendme. ...
The attack uses a corrupt server to send unique traffic patterns, consisting of sequences of short data bursts. ...
doi:10.1109/comst.2021.3093615
fatcat:fjc3r2672bbz3m4rtdiweurmby
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
[article]
2023
arXiv
pre-print
Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation ...
, resulting in a traffic accident. • Semantic Data/Knowledge Poisoning Attack. ...
For traffic management in vehicular ad hoc networks (VANETs), the use of digital twin can help map the traffic conditions on the real road environments into the cyber world. ...
arXiv:2301.13350v1
fatcat:ugccf7p3rzdyzbehsq2qkaru7u
An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities
[article]
2022
arXiv
pre-print
However, no clear guideline or standard exists for modeling these data flows. ...
This study aims to present an overview of cyber threats, attacks, and countermeasures on the primary domains of smart cities (smart government, smart mobility, smart environment, smart living, smart healthcare ...
In this attack, connected vehicles with fake identities are optimally placed to change traffic signal timings by corrupting traffic data. ...
arXiv:2207.04424v1
fatcat:wx23xb3mlfhajl6ualljthqdsy
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
2022
Future Internet
They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, deliver goods and observe environmental phenomena. ...
In this contribution, we propose a machine learning-based approach for detecting hijacking, GPS signal jamming and denial of service (DoS) attacks that can be carried out against a drone. ...
Institutional Review Board Statement: Not Applicable. Informed Consent Statement: Not Applicable. ...
doi:10.3390/fi14070205
fatcat:wxrnfy56mjel5isqciyrwnifm4
Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip
2015
Proceedings of the 9th International Symposium on Networks-on-Chip - NOCS '15
A rigorous simulation infrastructure is established to evaluate v the feasibility and potency of such an attack. ...
At the heart of the architectural innovation is a scalable high speed data communication structure, the network-on-chip (NoC). ...
Traffic Flow Manipulation To ensure a stealthy attack, the trojan manipulates the traffic flow at each router that a flit passes through. ...
doi:10.1145/2786572.2786580
dblp:conf/nocs/SACR15
fatcat:xnd254j74zdwbnfq62osgmz4cm
Game Theoretic Approaches in Vehicular Networks: A Survey
[article]
2020
arXiv
pre-print
, ubiquitous access to information, and various applications. ...
Then, a comprehensive review of applications of GT in VNs is presented, which primarily covers the aspects of QoS and security. ...
Data alteration attack
Data corruption attack
[90]
Assumed
coalition game
√ • Direct honesty: p d = D * p net
• Indirect honesty:pI = I * pnet
• p D : the probability that the monitored ...
arXiv:2006.00992v1
fatcat:lljjlitvlvbvhbg3aot5xszefm
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
2020
IEEE Access
However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. ...
A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. ...
The authors [205] suggested pertinent data selection or processing methods to minimize or avoid sensitive personal data within industrial applications.
C. ...
doi:10.1109/access.2020.3022842
fatcat:ifkplk2lsjhupkt4c42fovqpta
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
[article]
2020
arXiv
pre-print
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of IoT applications amongst researchers and technology industries over the last few years. ...
It also helps to isolate the traffic and manage prioritization to prevent attacks from network resource access controls and congested networks. Klaedtke et al. ...
[76] proposed an authentication method which can possibly avoid MITM attack. ...
arXiv:2003.00395v1
fatcat:32jta5ijkzb2nfi2hzatz5pbvi
Security Data Aggregation in Wireless Sensor Networks
[chapter]
2011
Emerging Communications for Wireless Sensor Networks
Finally, network congestion, multi-hop routing, node processing, and data aggregation introduce delays in the network and might lead to greater latency. ...
Recent advances in wireless sensor networks (WSNs) have led to several new promising applications including habitat monitoring and target tracking. ...
This framework also helps to draw the road map for the future design of attack resistant secure data aggregation. ...
doi:10.5772/10517
fatcat:sbcgudwkqrehvk6mohfohbzgxy
Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges
2012
IEEE Communications Surveys and Tutorials
Data transmission rates become highly asymmetric and links highly error prone. ...
, earthquakes, volcanic eruptions, floods, storms, hurricanes, severe electromagnetic interferences, congested usage, etc.) resulting in excessive delays, severe bandwidth restrictions, remarkable node ...
The authors finally informally concluded that, in such networking scenarios, complete reliability and wise data forwarding are quite challenging tasks. dependent information (e.g. traffic congestion, availability ...
doi:10.1109/surv.2011.041911.00093
fatcat:isxq2w2ppjgp3bfxu7bbfwcmli
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
2021
Electronics
On the other hand, privacy preservation for user's data in Fog devices and application data processed in Fog devices is another concern. ...
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last ...
It also helps to isolate the traffic and manage prioritization to prevent attacks from network resource access controls and congested networks. ...
doi:10.3390/electronics10101171
fatcat:h2q4vbw4dja4ho5tbdj4ijbnje
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
[article]
2020
arXiv
pre-print
Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy. ...
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer. ...
Routing attacks are traffic route diversions, hijacking, or DoS attacks. ...
arXiv:1910.09775v2
fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi
Robust Cyber–Physical Systems: Concept, models, and implementation
2016
Future generations computer systems
; • Close-loop control attacks; • Device coordination attack; • Command misleading, etc. ...
Here raw physical processes (RPP) data is collected, and the system is controlled by an intelligent computational world. ...
In testing the system threshold, selected values of τ are tested against stealthy geometric attacks. ...
doi:10.1016/j.future.2015.06.006
fatcat:uu4jvdxq3rbh7jstt4btdku5c4
« Previous
Showing results 1 — 15 out of 45 results