Skip to main content

Snaring Cyber Attacks on IoT Devices with Honeynet

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 75))

Abstract

Internet of things is a buzzword of this era, which tries to correlate digital gadgets that we have currently. Internet became the backbone of numerous things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame up to act as decoy to allure attackers. But this mechanism focuses only on a single system, whereas Honeynet is the network of high-interaction Honeypots. Therefore, we will implement concept of Honeynet in field of IoT. This research concentrates on how we can prevent the man-in-the-middle attack in IoT devices and still be capable of analyzing it using deception. In this research, we have implemented an authorization mechanism, OAuth, in Honeynet using which we will be capable to solve the issue of MITM attacks in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Oza AD, M.E. Student, Gujarat Technological University, Kumar GN, Project Engineer, CDAC-ACTS INDIA, Khorajiya M, Project Engineer, CDAC-ACTS INDIA (2018) Survey of Snaring Cyber Attacks on IoT devices with Honeypots and Honeynet. In: 3rd International conference for convergence in technology (I2CT), IEEE

    Google Scholar 

  2. Drrajivdesaimd.com (2017) INTERNET OF THINGS (IoT)—Dr Rajiv Desai. [online] Available at: http://drrajivdesaimd.com/2016/07/19/internet-of-things-iot

  3. Sherasiya T, Upadhyay H (2016) Intrusion detection system for internet of things. IJARIIE-ISSN(O)-2395-4396

    Google Scholar 

  4. Dial.uclouvain.be (2017) Measurements of compromised IoT devices from blackhole and honeypot|Mémoire UCL. [online] Available at: https://dial.uclouvain.be/memoire/ucl/en/object/thesis%3A10671

  5. Honeynet.org (2017) Know your enemy: Honeynets|The Honeynet project. [online] Available at: https://www.honeynet.org/papers/honeynet

  6. Anas Abd Almonim Nour Albashir (2015) Detecting unknown vulnerabilities using Honeynet, IEEE

    Google Scholar 

  7. La QD, Member, IEEE, Quek TQS, Senior Member, IEEE, Lee J, Member, IEEE, Jin S, Member, IEEE, Zhu H (2015) Deceptive attack and defense game in Honeypot-enabled networks for the internet of things, IEEE

    Google Scholar 

  8. Zhang W, He H, Kim T (2013) Xen-based virtual honeypot system for smart device. Springer Science+Business Media, New York

    Article  Google Scholar 

  9. IEEE Spectrum: Technology, Engineering, and Science News (2017) Internet-exposed energy control systems abound. [online] Available at: https://spectrum.ieee.org/energywise/energy/thesmartergrid/thousands-of-control-systems-connected-to-the-internet

  10. Anirudh M, Thileeban SA, Nallathambi DJ (2017) Use of Honeypots for mitigating DoS attacks targeted on IoT networks. In: IEEE international conference on computer, communication, and signal processing, IEEE

    Google Scholar 

  11. Sans.org (2017) [online] Available at: https://www.sans.org/readingroom/whitepapers/detection/designing-implementing-honeypotscada-network-35252

  12. Miloslavskaya N, Tolstoy A (2017) Ensuring information security for internet of things. In: 2017 IEEE 5th international conference on future internet of things and cloud, IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antara Durgesh Oza .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Oza, A.D., Kumar, G.N., Khorajiya, M., Tiwari, V. (2019). Snaring Cyber Attacks on IoT Devices with Honeynet. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7150-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7149-3

  • Online ISBN: 978-981-13-7150-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics