scispace - formally typeset
Proceedings ArticleDOI

Use of honeypots for mitigating DoS attacks targeted on IoT networks

Reads0
Chats0
TLDR
This paper proposes a honeypot model for mitigating DoS attacks launched on IoT devices and suggests a similar methodology is used to avoid the whole IoT system from being shut down due to a DoS attack.
Abstract
Every day, a new technology comes up and the primary reason why it fails to attract many people in this era is the concern of privacy and security. Each day, along with the new technology comes a load of vulnerabilities waiting to be exploited. IoT (Internet of Things) is the latest trend and like all technology, it is open for exploitation. The most common attack which is used to bring down a whole network, without even finding a loophole in the security — DoS can be used to pull down any IoT network as well. In this paper, we propose a honeypot model for mitigating DoS attacks launched on IoT devices. Honeypots are commonly used in online servers as a decoy to the main server so that the attack is mitigated to the decoy instead of the main server. Here a similar methodology is used to avoid the whole IoT system from being shut down due to a DoS attack.

read more

Citations
More filters
Journal ArticleDOI

A Review on the Use of Blockchain for the Internet of Things

TL;DR: A thorough review on how to adapt blockchain to the specific needs of IoT in order to develop Blockchain-based IoT (BIoT) applications is presented and some recommendations are enumerated with the aim of guiding future BIoT researchers and developers on some of the issues that will have to be tackled before deploying the next generation of BIeT applications.
Journal ArticleDOI

A Survey of Internet of Things (IoT) Authentication Schemes

TL;DR: This paper provides a near complete and up-to-date view of the IoT authentication field and provides a summary of a large range of authentication protocols proposed in the literature, using a multi-criteria classification previously introduced in this work.
Journal ArticleDOI

A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry

TL;DR: The article describes the most relevant use cases, since the broad adoption of blockchain unlocks a wide area of short- and medium-term promising automotive applications that can create new business models and even disrupt the car-sharing economy as the authors know it.
Journal ArticleDOI

A decentralized lightweight blockchain-based authentication mechanism for IoT systems

TL;DR: A decentralized authentication and access control mechanism is proposed for lightweight IoT devices and is applicable to a large number of scenarios and demonstrates a superior performance when compared to a state-of-the-art blockchain-based authentication technique.
Journal ArticleDOI

Securing internet of medical things systems: Limitations, issues and recommendations

TL;DR: There is a need to design an efficient intrusion detection/prevention system that cooperates with dynamic shadow honeypots and enhance the immunity of IoMT against cyber-attacks, and this paper proposes a security solution, which is divided into five different layers to detect and prevent attacks.
References
More filters
Proceedings ArticleDOI

Security analysis for Cyber-Physical Systems against stealthy deception attacks

TL;DR: This paper investigates three kinds of stealthy deception attacks according to the attacker's ability to compromise the system, and derives the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected.
Journal ArticleDOI

Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

TL;DR: This paper addresses the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender and shows that there is a threshold for the frequency of active attackers above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.
Proceedings ArticleDOI

A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things

TL;DR: A Service Oriented Architecture (SOA) provides a platform to the developers using which they can develop various applications for IoT without any concern regarding the nature of the objects, thereby acting as a middleware.
Proceedings ArticleDOI

Roaming honeypots for mitigating service-level denial-of-service attacks

TL;DR: This work proposes roaming honeypots, a mechanism that allows the locations of honeypots to be unpredictable, continuously changing, and disguised within a server pool, and provides service response time that is independent of attack load for a fixed number of attack machines.
Proceedings ArticleDOI

Deception in Honeynets: A Game-Theoretic Analysis

TL;DR: A game theoretic framework for modeling deception in honeynets is proposed based on extensive games of imperfect information and it is shown how these games are used to determine the strategies of the attacker and the honeynet system.
Related Papers (5)