Security Technologies for Networked Devices

To protect against “man-in-the-middle” attacks, wherein a hacker eavesdrops on messages between two or more nodes and relays or modifies messages so that the legitimate nodes are deceived into thinking they are talking directly to one another. To protect from such attacks, a successful information assurance strategy must make the mere reception of a signal useless to a would-be hacker.