<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.419546</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Kara</surname>
                                    <given-names>Mustafa</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Furat</surname>
                                    <given-names>Murat</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20180430">
                    <day>04</day>
                    <month>30</month>
                    <year>2018</year>
                </pub-date>
                                        <volume>6</volume>
                                        <issue>2</issue>
                                        <fpage>88</fpage>
                                        <lpage>93</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20150811">
                        <day>08</day>
                        <month>11</month>
                        <year>2015</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20171116">
                        <day>11</day>
                        <month>16</month>
                        <year>2017</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Security is an important issue that shouldbe taken care of by every system. In recent years, however, attackers areconstantly developing themselves with new techniques to obtain personalinformation on the network. As systems evolve, the data that needs to beprotected is increasingly appreciated and carries a higher risk of attack. Aswith many attacks such as MITM, there are solutions against this attacks.Nevertheless, these safety measures must be developed continuously. For thisreason, we have developed a new system architecture with user-definedauthentication against the intruders for the systems having large amount of datatransmission rate. To maintain integrity of data, over a reliable system isthat all incoming data are authenticated when data send to the server, on theother hand, in this system, the user-defined authentication can provide fastcommunication and it can decrease authentication time. The proposed systemintroduced in the present study checks for any changes in our instantaneousdata. Moreover, we control the data integrity on simple devices such as sensorsand motors or other industrial devices. Instead of using encryption, basicallyclient-server based authentication system is used to avoid complex operationsand protect the big data.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Client-server based authentication</kwd>
                                                    <kwd>  IIoT</kwd>
                                                    <kwd>  MITM</kwd>
                                                    <kwd>  Security</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	K. Hewage, S. Raza, and T. Voigt, “An experimental study of attacks on the availability of glossy”. Computers &amp; Electrical Engineering, V.41, 2015, pp. 115-125.
[2]	B. Daya, “Network security: History importance and future”, http://web.mit.edu/~bdaya/www/Network%20Security.pdf
[3]	S. Parveen and C. Sharma. “A Survey: Intelligent Intrusion Detection System in Computer Security”, International Journal of Computer Applications, Vol.151, No.3, 2016, pp.18-22.
[4]	K. Nesreen, N. Hamdy and S. H. Ahmed, “A Proposed Intrusion Detection System for Encrypted Computer Networks”, Third International Conference on Informatics and Systems, Giza, Egypt, 2005.
[5]	K. A. Varunkumar, M. Prabakaran, A. Kaurav, S. S. Chakkaravarthy, S. Thiyagarajan, P. Venkatesh. “Various Database Attacks and its Prevention Techniques”, International Journal of Engineering Trends and Technology, Vol. 9, No. 11, 2014, pp. 532-536.
[6]	C. Shire. “Advanced mobile security in silicon”. Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN. The 2nd IEE, London, UK , 2004.
[7]	H. Jadidoleslamy. “Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems”, International Journal of Computer Science and Engineering Survey, Vol. 3, No. 4, 2012, pp. 15-25.
[8]	R. Robbins. “Distributed intrusion detection systems: An introduction and review”, SANS Reading Room, GSEC Practical Assignment, 2002.
[9]	N. Einwechter. “An Introduction to Distributed Intrusion Detection Systems”, 2002, https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems
[10]	K. T. Nguyen, M. Laurent, and N. Oualha. “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks Vol. 32, 2015, pp. 17-31.
[11]	D. Wang, Y. Jiang, H. Song, F. He, M. Gu and J. Sun. “Verification of implementations of cryptographic hash functions”, IEEE Access, V. 5, 2017, pp. 7816 - 7825.
[12]	Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems, www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf
[13]	M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert and A. Wiesmaier. “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey”. Computers &amp; Security, Vol. 50, 2015, pp. 16-32. 
[14]	J. Jang-Jaccard and S. Nepal. “A survey of emerging threats in cybersecurity”. Journal of Computer and System Sciences, Vol. 80, Issue. 5, 2014, pp. 973-993.
[15]	K. Zetter. “Inside the cunning, unprecedented hack of Ukraine’s power grid”, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack -ukraines-power-grid.
[16]	Thuc, N. D., Phu N.C., Bao T.N., Hai V.T. “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan”. Department of Electronic Engineering and Information Sciences, RuhrUniversity Bochum, Germany, 2015.
[17]	A. Mittal, A. K. Shrivastava and M. Manoria. “A review of DDoS attack and its countermeasures in TCP based networks”, International Journal of Computer Science &amp; Engineering Survey (IJCSES), Vol. 2, No. 4, 2011, pp. 177-187.
[18]	TAN, Shuaishuai; LI, Xiaoping; DONG, Qingkuan. TrustR. “An integrated router security framework for protecting computer networks”. IEEE Communications Letters, 2016, 20.2: 376-379, 2016.
[19]	S. R. Borhade and S. A. Kahate. “Intrusion Detection System based on Hashing Technique”. Global Journal of Engineering Science and Researches, Vol. 3, No. 6, 2016, pp. 31-34.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
