Research Article
BibTex RIS Cite
Year 2018, Volume: 6 Issue: 2, 88 - 93, 30.04.2018
https://doi.org/10.17694/bajece.419546

Abstract

References

  • [1] K. Hewage, S. Raza, and T. Voigt, “An experimental study of attacks on the availability of glossy”. Computers & Electrical Engineering, V.41, 2015, pp. 115-125. [2] B. Daya, “Network security: History importance and future”, http://web.mit.edu/~bdaya/www/Network%20Security.pdf [3] S. Parveen and C. Sharma. “A Survey: Intelligent Intrusion Detection System in Computer Security”, International Journal of Computer Applications, Vol.151, No.3, 2016, pp.18-22. [4] K. Nesreen, N. Hamdy and S. H. Ahmed, “A Proposed Intrusion Detection System for Encrypted Computer Networks”, Third International Conference on Informatics and Systems, Giza, Egypt, 2005. [5] K. A. Varunkumar, M. Prabakaran, A. Kaurav, S. S. Chakkaravarthy, S. Thiyagarajan, P. Venkatesh. “Various Database Attacks and its Prevention Techniques”, International Journal of Engineering Trends and Technology, Vol. 9, No. 11, 2014, pp. 532-536. [6] C. Shire. “Advanced mobile security in silicon”. Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN. The 2nd IEE, London, UK , 2004. [7] H. Jadidoleslamy. “Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems”, International Journal of Computer Science and Engineering Survey, Vol. 3, No. 4, 2012, pp. 15-25. [8] R. Robbins. “Distributed intrusion detection systems: An introduction and review”, SANS Reading Room, GSEC Practical Assignment, 2002. [9] N. Einwechter. “An Introduction to Distributed Intrusion Detection Systems”, 2002, https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems [10] K. T. Nguyen, M. Laurent, and N. Oualha. “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks Vol. 32, 2015, pp. 17-31. [11] D. Wang, Y. Jiang, H. Song, F. He, M. Gu and J. Sun. “Verification of implementations of cryptographic hash functions”, IEEE Access, V. 5, 2017, pp. 7816 - 7825. [12] Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems, www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf [13] M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert and A. Wiesmaier. “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey”. Computers & Security, Vol. 50, 2015, pp. 16-32. [14] J. Jang-Jaccard and S. Nepal. “A survey of emerging threats in cybersecurity”. Journal of Computer and System Sciences, Vol. 80, Issue. 5, 2014, pp. 973-993. [15] K. Zetter. “Inside the cunning, unprecedented hack of Ukraine’s power grid”, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack -ukraines-power-grid. [16] Thuc, N. D., Phu N.C., Bao T.N., Hai V.T. “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan”. Department of Electronic Engineering and Information Sciences, RuhrUniversity Bochum, Germany, 2015. [17] A. Mittal, A. K. Shrivastava and M. Manoria. “A review of DDoS attack and its countermeasures in TCP based networks”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 2, No. 4, 2011, pp. 177-187. [18] TAN, Shuaishuai; LI, Xiaoping; DONG, Qingkuan. TrustR. “An integrated router security framework for protecting computer networks”. IEEE Communications Letters, 2016, 20.2: 376-379, 2016. [19] S. R. Borhade and S. A. Kahate. “Intrusion Detection System based on Hashing Technique”. Global Journal of Engineering Science and Researches, Vol. 3, No. 6, 2016, pp. 31-34.

Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices

Year 2018, Volume: 6 Issue: 2, 88 - 93, 30.04.2018
https://doi.org/10.17694/bajece.419546

Abstract

Security is an important issue that should
be taken care of by every system. In recent years, however, attackers are
constantly developing themselves with new techniques to obtain personal
information on the network. As systems evolve, the data that needs to be
protected is increasingly appreciated and carries a higher risk of attack. As
with many attacks such as MITM, there are solutions against this attacks.
Nevertheless, these safety measures must be developed continuously. For this
reason, we have developed a new system architecture with user-defined
authentication against the intruders for the systems having large amount of data
transmission rate. To maintain integrity of data, over a reliable system is
that all incoming data are authenticated when data send to the server, on the
other hand, in this system, the user-defined authentication can provide fast
communication and it can decrease authentication time. The proposed system
introduced in the present study checks for any changes in our instantaneous
data. Moreover, we control the data integrity on simple devices such as sensors
and motors or other industrial devices. Instead of using encryption, basically
client-server based authentication system is used to avoid complex operations
and protect the big data.

References

  • [1] K. Hewage, S. Raza, and T. Voigt, “An experimental study of attacks on the availability of glossy”. Computers & Electrical Engineering, V.41, 2015, pp. 115-125. [2] B. Daya, “Network security: History importance and future”, http://web.mit.edu/~bdaya/www/Network%20Security.pdf [3] S. Parveen and C. Sharma. “A Survey: Intelligent Intrusion Detection System in Computer Security”, International Journal of Computer Applications, Vol.151, No.3, 2016, pp.18-22. [4] K. Nesreen, N. Hamdy and S. H. Ahmed, “A Proposed Intrusion Detection System for Encrypted Computer Networks”, Third International Conference on Informatics and Systems, Giza, Egypt, 2005. [5] K. A. Varunkumar, M. Prabakaran, A. Kaurav, S. S. Chakkaravarthy, S. Thiyagarajan, P. Venkatesh. “Various Database Attacks and its Prevention Techniques”, International Journal of Engineering Trends and Technology, Vol. 9, No. 11, 2014, pp. 532-536. [6] C. Shire. “Advanced mobile security in silicon”. Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN. The 2nd IEE, London, UK , 2004. [7] H. Jadidoleslamy. “Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems”, International Journal of Computer Science and Engineering Survey, Vol. 3, No. 4, 2012, pp. 15-25. [8] R. Robbins. “Distributed intrusion detection systems: An introduction and review”, SANS Reading Room, GSEC Practical Assignment, 2002. [9] N. Einwechter. “An Introduction to Distributed Intrusion Detection Systems”, 2002, https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems [10] K. T. Nguyen, M. Laurent, and N. Oualha. “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks Vol. 32, 2015, pp. 17-31. [11] D. Wang, Y. Jiang, H. Song, F. He, M. Gu and J. Sun. “Verification of implementations of cryptographic hash functions”, IEEE Access, V. 5, 2017, pp. 7816 - 7825. [12] Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems, www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf [13] M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert and A. Wiesmaier. “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey”. Computers & Security, Vol. 50, 2015, pp. 16-32. [14] J. Jang-Jaccard and S. Nepal. “A survey of emerging threats in cybersecurity”. Journal of Computer and System Sciences, Vol. 80, Issue. 5, 2014, pp. 973-993. [15] K. Zetter. “Inside the cunning, unprecedented hack of Ukraine’s power grid”, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack -ukraines-power-grid. [16] Thuc, N. D., Phu N.C., Bao T.N., Hai V.T. “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan”. Department of Electronic Engineering and Information Sciences, RuhrUniversity Bochum, Germany, 2015. [17] A. Mittal, A. K. Shrivastava and M. Manoria. “A review of DDoS attack and its countermeasures in TCP based networks”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 2, No. 4, 2011, pp. 177-187. [18] TAN, Shuaishuai; LI, Xiaoping; DONG, Qingkuan. TrustR. “An integrated router security framework for protecting computer networks”. IEEE Communications Letters, 2016, 20.2: 376-379, 2016. [19] S. R. Borhade and S. A. Kahate. “Intrusion Detection System based on Hashing Technique”. Global Journal of Engineering Science and Researches, Vol. 3, No. 6, 2016, pp. 31-34.
There are 1 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Araştırma Articlessi
Authors

Mustafa Kara

Murat Furat

Publication Date April 30, 2018
Published in Issue Year 2018 Volume: 6 Issue: 2

Cite

APA Kara, M., & Furat, M. (2018). Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices. Balkan Journal of Electrical and Computer Engineering, 6(2), 88-93. https://doi.org/10.17694/bajece.419546

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı