Abstract
Internet of things is a buzzword of this era, which tries to correlate digital gadgets that we have currently. Internet became the backbone of numerous things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame up to act as decoy to allure attackers. But this mechanism focuses only on a single system, whereas Honeynet is the network of high-interaction Honeypots. Therefore, we will implement concept of Honeynet in field of IoT. This research concentrates on how we can prevent the man-in-the-middle attack in IoT devices and still be capable of analyzing it using deception. In this research, we have implemented an authorization mechanism, OAuth, in Honeynet using which we will be capable to solve the issue of MITM attacks in IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Oza AD, M.E. Student, Gujarat Technological University, Kumar GN, Project Engineer, CDAC-ACTS INDIA, Khorajiya M, Project Engineer, CDAC-ACTS INDIA (2018) Survey of Snaring Cyber Attacks on IoT devices with Honeypots and Honeynet. In: 3rd International conference for convergence in technology (I2CT), IEEE
Drrajivdesaimd.com (2017) INTERNET OF THINGS (IoT)—Dr Rajiv Desai. [online] Available at: http://drrajivdesaimd.com/2016/07/19/internet-of-things-iot
Sherasiya T, Upadhyay H (2016) Intrusion detection system for internet of things. IJARIIE-ISSN(O)-2395-4396
Dial.uclouvain.be (2017) Measurements of compromised IoT devices from blackhole and honeypot|Mémoire UCL. [online] Available at: https://dial.uclouvain.be/memoire/ucl/en/object/thesis%3A10671
Honeynet.org (2017) Know your enemy: Honeynets|The Honeynet project. [online] Available at: https://www.honeynet.org/papers/honeynet
Anas Abd Almonim Nour Albashir (2015) Detecting unknown vulnerabilities using Honeynet, IEEE
La QD, Member, IEEE, Quek TQS, Senior Member, IEEE, Lee J, Member, IEEE, Jin S, Member, IEEE, Zhu H (2015) Deceptive attack and defense game in Honeypot-enabled networks for the internet of things, IEEE
Zhang W, He H, Kim T (2013) Xen-based virtual honeypot system for smart device. Springer Science+Business Media, New York
IEEE Spectrum: Technology, Engineering, and Science News (2017) Internet-exposed energy control systems abound. [online] Available at: https://spectrum.ieee.org/energywise/energy/thesmartergrid/thousands-of-control-systems-connected-to-the-internet
Anirudh M, Thileeban SA, Nallathambi DJ (2017) Use of Honeypots for mitigating DoS attacks targeted on IoT networks. In: IEEE international conference on computer, communication, and signal processing, IEEE
Sans.org (2017) [online] Available at: https://www.sans.org/readingroom/whitepapers/detection/designing-implementing-honeypotscada-network-35252
Miloslavskaya N, Tolstoy A (2017) Ensuring information security for internet of things. In: 2017 IEEE 5th international conference on future internet of things and cloud, IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Oza, A.D., Kumar, G.N., Khorajiya, M., Tiwari, V. (2019). Snaring Cyber Attacks on IoT Devices with Honeynet. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-7150-9_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7149-3
Online ISBN: 978-981-13-7150-9
eBook Packages: EngineeringEngineering (R0)