Snaring cyber attacks on IoT devices with honeynet

4Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of things is a buzzword of this era, which tries to correlate digital gadgets that we have currently. Internet became the backbone of numerous things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame up to act as decoy to allure attackers. But this mechanism focuses only on a single system, whereas Honeynet is the network of high-interaction Honeypots. Therefore, we will implement concept of Honeynet in field of IoT. This research concentrates on how we can prevent the man-in-the-middle attack in IoT devices and still be capable of analyzing it using deception. In this research, we have implemented an authorization mechanism, OAuth, in Honeynet using which we will be capable to solve the issue of MITM attacks in IoT.

Cite

CITATION STYLE

APA

Oza, A. D., Kumar, G. N., Khorajiya, M., & Tiwari, V. (2019). Snaring cyber attacks on IoT devices with honeynet. In Lecture Notes in Networks and Systems (Vol. 75, pp. 1–12). Springer. https://doi.org/10.1007/978-981-13-7150-9_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free