Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Man In The Middle (MITM) Attack

Advancements in Quantum Blockchain With Real-Time Applications
A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application.
Published in Chapter:
Design of a Blockchain-Powered Biometric Template Security Framework Using Augmented Sharding
Sarika Khandelwal (G. H. Raisoni College of Engineering, Nagpur, India), Shaleen Bhatnagar (Presidency University, India), Nirmal Mungale (G. H. Raisoni College of Engineering, Nagpur, India), and Ritesh Kumar Jain (Geetanjali Institute of Technical Studies, India)
Copyright: © 2022 |Pages: 22
DOI: 10.4018/978-1-6684-5072-7.ch004
Abstract
Biometric templates must be secured with traceability, immutability, and high-trust capabilities. A variety of system models are proposed by researchers, most of which either utilize blockchains or machine learning for improved security and quality of service (QoS). The augmented sharding model is designed using light weight incremental learning framework, which assists in shard formation and management. Performance evaluation of the proposed model indicates that it is able to achieve high accuracy attack mitigation, along with low block mining delay and high throughput. This performance is compared with various state-of-the-art methods and an improvement of 10% in terms of delay and 14% in terms of throughput is achieved. Further, an attack detection accuracy of 99.3% is obtained for sybil, masquerading, and man in the middle (MITM) attacks. This text further recommends improvement areas which can be further researched for enhancing security and QoS performance of the proposed model.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
A MITM attack is a form of active eavesdropping in which the attacker establishes independent connections with the victim nodes and forwards messages between them, making them believe that they are communicating directly to each other over a private connection.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR