Different flavours of Man-In-The-Middle attack, consequences and feasible solutions | IEEE Conference Publication | IEEE Xplore