Articles with "replay attack" as a keyword



Non-deterministic approach to allay replay attack on iris biometric

Sign Up to like & get
recommendations!
Published in 2018 at "Pattern Analysis and Applications"

DOI: 10.1007/s10044-018-0681-8

Abstract: Biometric-based verification system has emerged as a powerful authentication tool. Despite its advantages over traditional systems, it is prone to several attacks. These attacks may creep through the biometric system and may prove fatal if… read more here.

Keywords: attack; replay attack; system; non deterministic ... See more keywords
Photo by dtopkin1 from unsplash

Common friends discovery for multiple parties with friendship ownership and replay-attack resistance in mobile social networks

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Networks"

DOI: 10.1007/s11276-016-1382-0

Abstract: Social networking sites have emerged as a powerful tool for maintaining contact and sharing information between people, allowing users to quickly and easily communicate and interact over the Internet. However, such services have raised serious… read more here.

Keywords: replay attack; privacy; attack resistance; common friends ... See more keywords

Detection, differentiation and localization of replay attack and false data injection attack based on random matrix

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Reports"

DOI: 10.1038/s41598-024-52954-z

Abstract: Replay attack and false data injection attack (FDIA) are two common types of cyber-attacks against supervisory control and data acquisition systems, aiming to disrupt the normal operation of the power system by falsifying meter measurements.… read more here.

Keywords: detection; replay attack; attack; random matrix ... See more keywords

Covariance Intersection-Based Kalman Consensus Filtering With Sequential Replay Attack Detection Over Sensor Networks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Sensors Journal"

DOI: 10.1109/jsen.2024.3417511

Abstract: This article focuses on the security issue of consensus-based distributed filtering under replay attacks over wireless sensor networks. The local information from each sensor, which could be subject to replay attacks, is sent to its… read more here.

Keywords: consensus; replay attack; replay; attack detection ... See more keywords

Spectro-Temporally Compressed Source Features for Replay Attack Detection

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2024.3370490

Abstract: The role of pitch-synchronous source features in the detection of replay attacks on speaker verification systems has been explored earlier. This letter presents some advancements in the processing which enable the use of the entire… read more here.

Keywords: replay attack; attack detection; source features; source ... See more keywords
Photo by nampoh from unsplash

Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Automation Science and Engineering"

DOI: 10.1109/tase.2020.3013760

Abstract: Supervisory control and data acquisition (SCADA) systems are widely used for industrial control of critical infrastructures, such as power plants and manufacturing systems. There is abundant evidence of SCADA systems being subject to cyberattacks. With… read more here.

Keywords: equipment; equipment faults; scada systems; replay attack ... See more keywords

Fault Detection for Unmanned Marine Vehicles Under Replay Attack

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Fuzzy Systems"

DOI: 10.1109/tfuzz.2022.3215284

Abstract: This article investigates the fault detection problem of unmanned marine vehicles (UMVs) under the influence caused by replay attacks. First, the dynamics of UMV are modeled by a Takagi--Sugeno (T--S) fuzzy system with an unknown… read more here.

Keywords: fault detection; unmanned marine; detection; marine vehicles ... See more keywords

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2023.3312545

Abstract: Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For such systems, Controller Area Network (CAN) bus offer high-integrity serial communication capabilities. It… read more here.

Keywords: data traceability; replay attack; crypto; encryption ... See more keywords

Bilateral Control for Secure Communication Against Replay Attack in ORAN-Based Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2024.3392944

Abstract: Open radio access network (ORAN)-based vehicular networks play a pivotal role in future traffic data sharing. Due to the openness of the ORAN framework, it is necessary to encrypt the sharing data to prevent unauthorized… read more here.

Keywords: replay attack; control; oran based; vehicular networks ... See more keywords