Securing Internet of Things(IoT) using honeypots

2Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

In today's everlasting technological world, information and data communication create more devices stay connected to the internet. This lead to achieving development for building different software and internet connection very inexpensive this affected privacy and security. Security today became of the most important issue because day-by-day new technologies are put forward for different purposes of study while these come with a lot of vulnerabilities which makes the exploitation of the data. IoT is also such kind technology which is available for exploiting. For preserving information from such type of attacks we use honeypot which serves as a decoy based technology in a network and these are cost effective and works as a deception model which entice attackers with low vulnerabilities and security. Here are how honeypots used to defend IoT devices from being attacked and gather information about the attackers' device.

Cite

CITATION STYLE

APA

Gadde, S. S., Ganta, R. K. S., Gopala Gupta, A. S. A. L. G., Raghava Rao, K., & Mohan Rao, K. R. R. (2018). Securing Internet of Things(IoT) using honeypots. International Journal of Engineering and Technology(UAE), 7, 820–824. https://doi.org/10.14419/ijet.v7i2.7.11075

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free