A survey on consensus protocols and attacks on blockchain technology

A Guru, BK Mohanta, H Mohapatra, F Al-Turjman… - Applied Sciences, 2023 - mdpi.com
In the current era, blockchain has approximately 30 consensus algorithms. This
architecturally distributed database stores data in an encrypted form with multiple checks …

Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways

S Ashraf, MH Shawon, HM Khalid, SM Muyeen - Sensors, 2021 - mdpi.com
The generation of the mix-based expansion of modern power grids has urged the utilization
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …

Address resolution protocol spoofing attacks and security approaches: A survey

S Hijazi, MS Obaidat - Security and Privacy, 2019 - Wiley Online Library
Address resolution protocol (ARP) is a very popular communication protocol in the local
area network (LAN), working under the network layer, as per the open systems …

A new detection and prevention system for ARP attacks using static entry

S Hijazi, MS Obaidat - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
This paper investigates the vulnerabilities of address resolution protocol (ARP), which is one
of the key protocols in the TCP/IP suite, and used to associate the Internet protocol address …

Provably curb man-in-the-middle attack-based ARP spoofing in a local network

HI Nasser, MA Hussain - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Even today, internet users' data security remains a significant concern. One problem is ARP
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …

Deep Insight into IoT‐Enabled Agriculture and Network Protocols

MZ Hasan, ZM Hanapi, MZ Hussain… - Wireless …, 2022 - Wiley Online Library
In recent years, research has combined the connection of agricultural equipment to increase
crop growth rates and lower planting costs by refining the entire planting process. IT …

[PDF][PDF] Detecting end-point (EP) man-in-the-middle (MITM) attack based on ARP analysis: A machine learning approach

JJ Kponyo, JO Agyemang… - International Journal of …, 2020 - pdfs.semanticscholar.org
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security.
This attack targets the flow of information between endpoints. An attacker is able to …

Man-in-the-middle-attack and proposed algorithm for detection

A Nigam, S Sharma, RK Patel… - … International Mobile and …, 2022 - ieeexplore.ieee.org
Today, when every-day processes are going online, the risk of cyber-attacks are increasing
at an exponential rate. As everything is going online, we see an increase in the availability of …

[PDF][PDF] An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

HI Nasser, MA Hussain - Iraqi Journal for Electrical & Electronic Engineering, 2023 - iasj.net
Abstract Address Resolution Protocol (ARP) is used to resolve a host's MAC address, given
its IP address. ARP is stateless, as there is no authentication when exchanging a MAC …

Combating ARP Spoofing: Detection and Analysis Techniques

D Patel, D Shah - 2024 11th International Conference on …, 2024 - ieeexplore.ieee.org
Address Resolution Protocol (ARP) spoofing creates a security threat by exploiting
weaknesses in how devices in a network link IP address to physical addresses. In a …