2023
DOI: 10.1109/jsyst.2022.3168234
|View full text |Cite
|
Sign up to set email alerts
|

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…According to this model, an adversary is empowered to eavesdrop, delete, and modify messages transmitted through a public channel, allowing for the execution of various security attacks. These include performing impersonation, replay, and man-in-the-middle (MITM) attacks; acquiring a user's smart device to extract stored data through power analysis attacks [26][27][28]; legally creating avatars for impersonation attempts; and potentially functioning as an insider within the platform server. Additionally, we incorporate the more rigorous "Canetti-Krawczyk (CK) model" [29], which surpasses the assumptions of the DY model.…”
Section: Adversary Modelmentioning
confidence: 99%
“…According to this model, an adversary is empowered to eavesdrop, delete, and modify messages transmitted through a public channel, allowing for the execution of various security attacks. These include performing impersonation, replay, and man-in-the-middle (MITM) attacks; acquiring a user's smart device to extract stored data through power analysis attacks [26][27][28]; legally creating avatars for impersonation attempts; and potentially functioning as an insider within the platform server. Additionally, we incorporate the more rigorous "Canetti-Krawczyk (CK) model" [29], which surpasses the assumptions of the DY model.…”
Section: Adversary Modelmentioning
confidence: 99%
“…The adversary can have the following capabilities based on the Dolev-Yao (DY) threat model. The Dolev-Yao threat model [22] is widely employed in the analysis of protocol security [23][24][25]. The capabilities of an adversary are defined as follows:…”
Section: Adversary Modelmentioning
confidence: 99%
“…To identify attacks, smishing data was correlated with other datasets (i.e., web browsing history). Last but not least, the authors in [39] proposed an authentication scheme for phishing attacks through mobile online social networks. The aim was mainly to defend against phishing attacks.…”
Section: Related Workmentioning
confidence: 99%