z-logo
open-access-imgOpen Access
IOT HONEYPOT WITH USING SECURE AUTHENTICATION
Author(s) -
Ihor Sushyn,
Dmytro Minochkin
Publication year - 2020
Publication title -
zbìrnik naukovih pracʹ vìjsʹkovogo ìnstitutu kiïvsʹkogo nacìonalʹnogo unìversitetu ìmenì tarasa ševčenka
Language(s) - English
Resource type - Journals
eISSN - 2519-481X
pISSN - 2524-0056
DOI - 10.17721/2519-481x/2020/68-08
Subject(s) - computer science , computer security , variety (cybernetics) , honeypot , authentication (law) , the internet , encryption , vulnerability (computing) , computer network , world wide web , artificial intelligence
The article considers the method of increasing the security of Internet of Things technologies. Users fear the consequences of Internet security violations. Therefore, digital security must be designed from zero and at all points of the system so vulnerabilities do not jeopardize the whole system in a certain part. The risk must be reduced throughout the life cycle, especially in view of its scaling and geographical expansion. The Internet of Things consists of a large number of inexpensive devices. IoT devices usually have limited memory and battery power, which gives very limited computing and communication capabilities. The use of encryption/decryption algorithms should not require large resources, and the frequency range is limited. It is also a large-scale network that supports mass connections. Network transmission protocols must include many new features, such as multi-transient routing, shared relay, dynamic access, and other to meet this demand. It is extremely difficult to manage and distribute private keys with this network setup. A variety of usage scenarios require different QoS and security levels. Nowadays IoT plays an important role in many scenarios and has great potential for further dissemination. There is a need to increase the efficiency of a particular enterprise, processes, so the number of interactive things that create smart areas (houses, offices, warehouses, cities) is growing. The implementation of this areas reaches a variety of technologies, which vulnerable from the found attacks over time, leading to significant losses, as data and time. There are many suggestions that address target issue after finding a vulnerability, but this may not be effective enough. Therefore, it was proposed to create a method that can solve a set of problems simultaneously by combining PKI secure authentication and honeypots. It will not only detect new vulnerabilities and attacks faster, but also waste attackers' resources (all captured attacks will be identified and attacker profiles created).

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here