Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Man-in-the-middle Attack

Recent Advancements in Smart Remote Patient Monitoring, Wearable Devices, and Diagnostics Systems
An attacker listens to the ongoing conversation of two authentic entities. Then, attacker acts as a legitimate entity with intercepted message.
Published in Chapter:
Robust User Authentication Scheme for IoT-Based Healthcare Applications
Geeta Sharma (Lovely Professional University, India) and Gursimrat Singh (University Health Network, Canada)
DOI: 10.4018/978-1-6684-6434-2.ch008
Abstract
Cloud technology and internet of things (IoT) is a quickly developing computing technology through which resources are shared via internet. IoT facilitates seamless interactions between humans and heterogeneous devices including personalized healthcare systems. It has the potential to provide ensure supervision of the elderly, telemonitoring, teleconsultations, and computer-assisted rehabilitation. These healthcare services allow easy access of patient data in real time. However, IoT-based remote patient monitoring and other healthcare applications are growing fast; the hurdle to its growth is security. This chapter proposes a novel remote user authentication scheme for IoT-enabled healthcare applications. The scheme is lightweight and robust to attacks and also has low computational overhead. The proposed scheme satisfies the desired essential attributes of security. A formal verification performed using ProVerif proves the security of the scheme.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Identification Protocols
A form of eavesdropping where communication between two users is monitors and modified by an authorized party.
Full Text Chapter Download: US $37.50 Add to Cart
An Analysis of Industry 4.0
An attacker who has gained unauthorized access to a network can intercept dataflows across that network fabric, whether ethernet-based or wireless.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Man-in-the-middle attack is an attack in which an attacker is able to read, insert, and modify messages between two communication parties.
Full Text Chapter Download: US $37.50 Add to Cart
Hacker and Non-Attributed State Actors
A method used to interact with the user and/or the intended recipient of a communication, transaction or session in order to capture credentials, intercept traffic, and collect data to undertake further nefarious activities.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
A type of attack where an attacker places himself/herself between the sender and receiver of information and sniffs any information which is transmitted in the channel. Attacker also can alter the communication between two parties.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR