scholarly journals Block-hash of blockchain framework against man-in-the-middle attacks

2021 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Iqbal Busthomi ◽  
Arif Wirawan Muhammad

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the authentication payload is still in plain text, so the data confidentiality has not minimize passive voice. After implementing Blockchain technology to the system, white-box testing using the Wireshark gives the result that the authentication payload sent has been well encrypted and safe enough. The percentage of security test results gets 95% which shows that securing the system from MITM attacks is relatively high. Although it has succeeded in securing the system from MITM attacks, it still has a vulnerability from other cyber attacks, so implementation of the Blockchain needs security improvisation.

2020 ◽  
Vol 5 (2) ◽  
pp. 125
Author(s):  
Raden Alifian Setiawan ◽  
Hanna Hanna ◽  
Alberth Alberth

The use of videos in education makes it possible to overcome practical real-world constraints and explore far greater possibilities provided by digital spaces, especially for the video uploaded in online platform such as blog. This study examines whether online video blog as media have a significant effect on students’ achievement of passive voice. It used pre-experimental (one group pre-test and post-test) design. The samples of this study were 10 students at 4J Operation. A pre-test and post-test were conducted by using multiple choice questions as the instruments. Data analysis was through paired-sample t-test. Results showed that there was an increase in mean score of pre-test (49,1) and post-test (63,5). Data from Paired Sample t-test showed that Sig. (2-tailed) was 0.000 which was smaller than .05 which means that there was significance difference in mean score after employing treatment.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


Author(s):  
James Jin Kang ◽  
Kiran Fahd ◽  
Sitalakshmi Venkatraman ◽  
Rolando Trujillo-Rasua ◽  
Paul Haskell-Dowland

Author(s):  
Chad Calvert ◽  
Taghi M. Khoshgoftaar ◽  
Maryam M. Najafabadi ◽  
Clifford Kemp

In this work, we outline a procedure for collecting and labeling Man-in-the-Middle (MITM) attack traffic. Our capture procedure allows for the collection of real-world representative data using a full-scale network environment. MITM attacks are typically performed with the purpose of intercepting information amongst two networked machines. This enables the attacker to gain access to otherwise confidential communications and potentially alter said communications maliciously. MITM attacks are still a very common attack that can be implemented with relative ease across a variety of network environments. Our work establishes experimental procedures for enacting three prevalent MITM attack variants through penetration testing. The process for data collection is defined, along with our approach on gathering real-world, representative data. We also present a novel labeling procedure based on the inherent behaviors of each MITM attack variant. Our work aims to address the challenges associated with collecting such data within a live production environment, as well as identify the impact MITM attacks have on traffic behavior. We also present a case study to provide some quantitative analysis regarding the data collected.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Miqi Wu ◽  
Lin You ◽  
Gengran Hu ◽  
Liang Li ◽  
Chengtang Cao

In a multiserver architecture, authentication schemes play an important role in the secure communication of the system. In many multiserver authentication schemes, the security of the mutual authentications among the participants is based on the security of the registration center’s private key. This centralized architecture can create security risks due to the leakage of the registration center’s private key. Blockchain technology, with its decentralized, tamper-proof, and distributed features, can provide a new solution for multiserver authentication schemes. In a lot of multiserver authentication schemes, users’ permission is generally controlled by the registration center (RC), but these permission control methods cannot be applied in the decentralized blockchain system. In this paper, a blockchain-based authentication scheme for multiserver architecture is proposed. Our scheme provides a hierarchical authentication method to solve the problems of user permission control and user revocation caused by no registration center. The security of our scheme is formally proved under the random oracle model. According to our analysis, our scheme is resistant to attacks such as impersonation attacks and man-in-the-middle attacks. In addition, our performance analysis shows that the proposed scheme has less computation overhead.


2021 ◽  
Vol 11 (21) ◽  
pp. 9792
Author(s):  
Konstantinos Kaltakis ◽  
Panagiota Polyzi ◽  
George Drosatos ◽  
Konstantinos Rantos

Blockchain, a promising technology that has matured and nowadays is widely used in many fields, such as supply chain management, smart grids, agriculture and logistics, has also been proposed for the Internet of Vehicles (IoV) ecosystem to enhance the protection of the data that roadside units and vehicles exchange. Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own. As such, solutions that utilise this technology have to consider the adoption of privacy-preserving schemes to address users’ privacy concerns. This paper provides a literature review of proposed solutions that provide different vehicular services using blockchain technology while preserving privacy. In this context, it analyses existing solutions’ main characteristics and properties to provide a comprehensive and critical overview and identifies their contribution in the field. Moreover, it provides suggestions to researchers for future work in the field of privacy-preserving blockchain-enabled solutions for vehicular networks.


Author(s):  
Danish Javeed ◽  
Umar MohammedBadamasi

Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area


2021 ◽  
Vol 7 ◽  
pp. e709
Author(s):  
Yanhui Liu ◽  
Jianbiao Zhang ◽  
Shupei Wu ◽  
Muhammad Salman Pathan

With the recent development in network technology over a few years, digital works can be easily published online. One of the main issues in the field of digital technology is the infringement of digital works, which can seriously damage the data owners’ rights and affects the enthusiasm of the owners to create original work. Thus, more attention is required for the protection of digital copyright as it has a great impact on the development of society. Many digital copyright protection techniques were developed in the past, but still, there are many loopholes in the protection systems to be covered. The protection means are still relatively weak, timeliness is poor, infringement is frequent, a right determination is cumbersome, and the results are not ideal. Aiming at the mentioned problems, this paper proposes a protection technique, which can realize the automatic management of the complete digital rights life cycle on the blockchain using fabric's smart contract technology. The proposed system is based on blockchain technology, which leverages the distributed, tamper-proof and traceable characteristics of blockchain. The system uses smart contracts to manage the full life cycle of digital copyright. The test results show that the proposed system provides effective protection of the digital copyright system and can efficiently confirm the rights of digital copyright.


Sign in / Sign up

Export Citation Format

Share Document