{"id":"https://openalex.org/W2903175818","doi":"https://doi.org/10.3390/cryptography2040038","title":"Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity","display_name":"Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity","publication_year":2018,"publication_date":"2018-12-05","ids":{"openalex":"https://openalex.org/W2903175818","doi":"https://doi.org/10.3390/cryptography2040038","mag":"2903175818"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2040038","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040038","pdf_url":"https://www.mdpi.com/2410-387X/2/4/38/pdf?version=1544590508","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/4/38/pdf?version=1544590508","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088873861","display_name":"James Jin Kang","orcid":"https://orcid.org/0000-0002-0242-4187"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]},{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"James Jin Kang","raw_affiliation_strings":["Melbourne Polytechnic, Preston 3181, Australia","School of Information Technology, Deakin University, Burwood 3125, Australia"],"raw_orcid":"https://orcid.org/0000-0002-0242-4187","affiliations":[{"raw_affiliation_string":"Melbourne Polytechnic, Preston 3181, Australia","institution_ids":["https://openalex.org/I4403386716"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood 3125, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001876507","display_name":"Kiran Fahd","orcid":"https://orcid.org/0009-0002-8213-3984"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Kiran Fahd","raw_affiliation_strings":["Melbourne Polytechnic, Preston 3181, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Melbourne Polytechnic, Preston 3181, Australia","institution_ids":["https://openalex.org/I4403386716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072259792","display_name":"Sitalakshmi Venkatraman","orcid":"https://orcid.org/0000-0002-2772-133X"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sitalakshmi Venkatraman","raw_affiliation_strings":["Melbourne Polytechnic, Preston 3181, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2772-133X","affiliations":[{"raw_affiliation_string":"Melbourne Polytechnic, Preston 3181, Australia","institution_ids":["https://openalex.org/I4403386716"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088873861"],"corresponding_institution_ids":["https://openalex.org/I149704539","https://openalex.org/I4403386716"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.3137,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.80336949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":"4","first_page":"38","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.8925228118896484},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8053642511367798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6785092353820801},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.5487074851989746},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5139536261558533},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5082551836967468},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47506043314933777},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42788901925086975},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.415776789188385},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.41332152485847473},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20241206884384155},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08067241311073303}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.8925228118896484},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8053642511367798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6785092353820801},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.5487074851989746},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5139536261558533},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5082551836967468},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47506043314933777},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42788901925086975},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.415776789188385},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.41332152485847473},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20241206884384155},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08067241311073303}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/cryptography2040038","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040038","pdf_url":"https://www.mdpi.com/2410-387X/2/4/38/pdf?version=1544590508","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e9dc14518b714dac9f2fd4c4b59f0efc","is_oa":true,"landing_page_url":"https://doaj.org/article/e9dc14518b714dac9f2fd4c4b59f0efc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 4, p 38 (2018)","raw_type":"article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30116058","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20781586","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Trusted_time-based_verification_model_for_automatic_man-in-the-middle_attack_detection_in_cybersecurity/20781586","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/4/38/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2040038","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2040038","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040038","pdf_url":"https://www.mdpi.com/2410-387X/2/4/38/pdf?version=1544590508","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2903175818.pdf","grobid_xml":"https://content.openalex.org/works/W2903175818.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2020279094","https://openalex.org/W2059378890","https://openalex.org/W2144232108","https://openalex.org/W2175137100","https://openalex.org/W2254700249","https://openalex.org/W2570013196","https://openalex.org/W2611011005","https://openalex.org/W2678934292","https://openalex.org/W2885330389","https://openalex.org/W6739612070"],"related_works":["https://openalex.org/W2572573095","https://openalex.org/W2076357705","https://openalex.org/W4385671684","https://openalex.org/W2944340562","https://openalex.org/W2801930800","https://openalex.org/W2605858460","https://openalex.org/W2509010417","https://openalex.org/W2983839871","https://openalex.org/W199411532","https://openalex.org/W2898746803"],"abstract_inverted_index":{"Due":[0],"to":[1,17,33,67,78,93,102,145],"the":[2,24,35,57,103,143,154],"prevalence":[3],"and":[4,11,20,22,31,40,100,105,133,179],"constantly":[5],"increasing":[6],"risk":[7],"of":[8,28,60,131,139,153],"cyber-attacks,":[9],"new":[10],"evolving":[12],"security":[13,26],"mechanisms":[14],"are":[15],"required":[16],"protect":[18],"information":[19],"networks":[21],"ensure":[23],"basic":[25],"principles":[27],"confidentiality,":[29],"integrity,":[30],"availability\u2014referred":[32],"as":[34,84,86,170],"CIA":[36],"triad.":[37],"While":[38],"confidentiality":[39],"integrity":[41],"can":[42,184],"be":[43,64],"achieved":[44],"using":[45,128,157],"Secure":[46],"Sockets":[47],"Layer":[48,50],"(SSL)/Transport":[49],"Security":[51],"(TLS)":[52],"certificates,":[53],"these":[54,191],"depend":[55],"on":[56],"correct":[58],"authentication":[59],"servers,":[61],"which":[62,175],"could":[63],"compromised":[65],"due":[66,77],"man-in-the-middle":[68],"(MITM)":[69],"attacks.":[70],"Many":[71],"existing":[72,167],"solutions":[73],"have":[74],"practical":[75,192],"limitations":[76,193],"their":[79],"operational":[80],"complexity,":[81],"deployment":[82],"costs,":[83,182],"well":[85],"adversaries.":[87],"We":[88],"propose":[89],"a":[90,111,123,158,186],"novel":[91,112],"scheme":[92,114],"detect":[94,147],"MITM":[95,148],"attacks":[96,149],"with":[97,150,166],"minimal":[98],"intervention":[99],"workload":[101],"network":[104,180],"systems.":[106],"Our":[107],"proposed":[108],"model":[109],"applies":[110],"inferencing":[113,160],"for":[115],"detecting":[116],"true":[117],"anomalies":[118],"in":[119,164],"transmission":[120,155],"time":[121,125,156],"at":[122],"trusted":[124,151],"server":[126],"(TTS)":[127],"time-based":[129],"verification":[130,152],"sent":[132],"received":[134],"messages.":[135],"The":[136],"key":[137],"contribution":[138],"this":[140],"paper":[141],"is":[142],"ability":[144],"automatically":[146],"learning-based":[159],"algorithm.":[161],"When":[162],"used":[163],"conjunction":[165],"systems,":[168],"such":[169],"intrusion":[171],"detection":[172],"systems":[173],"(IDS),":[174],"require":[176],"comprehensive":[177],"configuration":[178],"resource":[181],"it":[183],"provide":[185],"robust":[187],"solution":[188],"that":[189],"addresses":[190],"while":[194],"saving":[195],"costs":[196],"by":[197],"providing":[198],"assurance.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
