z-logo
open-access-imgOpen Access
A Honey pot Implementation for security Enhancement in IOT System using AES and Key management
Author(s) -
Pothumani.Parvathi et. al.
Publication year - 2021
Publication title -
türk bilgisayar ve matematik eğitimi dergisi
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.218
H-Index - 3
ISSN - 1309-4653
DOI - 10.17762/turcomat.v12i3.2149
Subject(s) - computer security , computer science , key (lock) , adversary , identification (biology) , software deployment , near field communication , field (mathematics) , telecommunications , mathematics , botany , ultra high frequency , pure mathematics , biology , operating system
: Honey pot technology is a trap technology in network defence. It studies and learns the adversary’s attacks by attracting and deceiving attackers and recording their attack behaviours. Target and attack methods to protect real service resources. However, traditional honey pot technology has inherent shortcomings such as static configuration and fixed deployment, and it is very easy to be attacked. Attacker identification bypasses and loses decoy value. Therefore, how to improve the dynamic and deceptive nature of honey pots has become a key issue in the field of honey pots. This paper is the research results in the field of honey pots at home and abroad are sorted out. First, the development history of honey pots is summarized. Then, the key technology of honey pots is the core, and the implementation process, department. It analyzes the method of signature, anti-identification thinking, and the theoretical basis of game; finally, it classifies and narrates the defence results of different honey pots in recent years, and develops the honey pot technology. Development trends are analyzed and stated, aiming at potential security threats, and looking forward to defence applications in emerging areas. In this paper, novel AES algorithm has been developed. In addition key management feature is added which provides more secure for registered users.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here