A Study on different flavours of securing shared data with user revocation
used to create a connection between two clients or web service which is secure and stable. Man in the middle attack allows the attacker to gain unauthorized entry into the connection between two devices and listen to the network traffic. This type of attack is very ruinous because it is almost unseen to the victim device. This survey paper on man in the middle attack focuses on the execution of man in the middle attack on d-Helman and what are the different methods with which it can be performed and the various defenses against the attack.
Index Terms: Man-In-The-Middle (MITM) attack, MITM defense techniques, MITM classification, and security
How to Cite
International Journal of Engineering Technology and Computer Research (IJETCR) by Articles is licensed under a Creative Commons Attribution 4.0 International License.