Implementation Of Securing Iot Networks Using Honeypot Mechanism For Embedded Applications

K. Sita, K.Vijaya Vardhan

Abstract


In the modern day, most of the enterprises have decided to move their services to a web based system which is more convenient and easily accessible to all the customers. With the advent of Internet of Things, several thousand more devices transmit data through the internet to perform various tasks that optimize our issues. These devices can provide a possible security loophole for unauthorized or illegal access. Security is one of the basic requirements in today's world as any type of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data integrity are the basic security characteristics of computer security. A decoy based technology, Honeypot along with a Raspberry Pi makes network security cost effective and easy to implement. This paper is devoted to implement a Raspberry Pi based Honeypot in a network that will attract attackers by simulating vulnerabilities and poor security. Honeypot will record all the attackers’ activities and it blocks certain privileges after data analysis not only displays the type of attack but it allow improvements in security , it blocks the IP address of the attacker and it sends a alert notification to admin of the network.


Full Text:

PDF




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org