Securing Internet of Things(IoT) Using HoneyPots

  • Authors

    • Sai Sudha Gadde
    • Rama Krishna Srinivas Ganta
    • ASALG Gopala Gupta
    • Raghava Rao K
    • KRR Mohan Rao
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.11075
  • Security, Internet of Things(IoT), Port Scan, HoneyPot
  • In today’s everlasting technological world, information and data communication create more devices stay connected to the internet. This lead to achieving development for building different software and internet connection very inexpensive this affected privacy and security. Security today became of the most important issue because day-by-day new technologies are put forward for different purposes of study while these come with a lot of vulnerabilities which makes the exploitation of the data. IoT is also such kind technology which is available for exploiting. For preserving information from such type of attacks we use honeypot which serves as a decoy based technology in a network and these are cost effective and works as a deception model which entice attackers with low vulnerabilities and security. Here are how honeypots used to defend IoT devices from being attacked and gather information about the attackers’ device.

     

  • References

    1. [1] Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin and Hongbo Zhu “Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things†in IEEE Internet of Things Journal, Dec 2016.

      [2] Anirudh M, Arul Thileeban S and Daniel Jeswin Nallathambi “Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks†in IEEE International Conference on Computer, Communication, and Signal Processing (ICCCSP-2017)

      [3] Seamus Dowling, Michael Schukat, Hugh Melvin “A ZigBee Honeypot to assess IoT Cyberattack Behaviour†in IEEE Signals and Systems conference(ISCC-2017)

      [4] Theodor Richardson “Preventing Attacks on Back-End Servers using Masquerading/Honeypots†in Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Jun. 2006, pp. 381–388.

      [5] Aaditya Jain, Bhuwnesh Sharma, Pawan Gupta “Honeypot: An External layer of Security Against Advanced attacks on Network†in International Conference on Recent Trends in Engineering Science and Management, Apr.2016.

      [6] Surendra Mahajan, Akshay Mhasku Adagale, Chetna Sahare “Intrusion Detection System Using Raspberry PI Honeypot in Network Security†in International Journal of Engineering Science and Computing, Mar.2016.

      [7] S. Hausman “Navigating security threats posed by Internet of Things technology†[online]. Available: http://www.securityinfowatch.com/article/11714106/navigating-security-threats-posed-by-internet-of-things-technology

      [8] http://searchsecurity.techtarget.com/tip/The-ABCs-of-ciphertext-exploits-and-other-cryptography-attacks

      [9] http://www.keyfocus.net/kfsensor/help/Concepts/con_Alerts.php

  • Downloads

  • How to Cite

    Sudha Gadde, S., Krishna Srinivas Ganta, R., Gopala Gupta, A., Rao K, R., & Mohan Rao, K. (2018). Securing Internet of Things(IoT) Using HoneyPots. International Journal of Engineering & Technology, 7(2.7), 820-824. https://doi.org/10.14419/ijet.v7i2.7.11075