Guardian Hive: Safeguarding IoT Devices with Honeypot Security

Authors

  • Danial Jamil Department of Computer Science & IT, Ghazi University, Dera Ghazi Khan, Pakistan.
  • Muzammil Ahmad Khan Computer Engineering Departments, Sir Syed University of Engineering and Technology, Karachi , Pakistan.
  • Zaib Un Nisa Khosa Department of Computer Science & IT, Ghazi University, Dera Ghazi Khan, Pakistan.
  • Mubeen Ashraf School of Cyber Engineering, Xidian University, Xi'an China
  • Fahad Atta School of Computer Science and Technology, Xidian University, China
  • Yousaf Haroon Capital University of Science and Technology Islamabad, Pakistan.

Keywords:

IOT, Honeynet, Open Authorization, MITM cyberattack

Abstract

The word "Internet of Things (IoT)" denotes a modern concept that attempts to connect our current technology. The Internet evolved into the foundation for a wide range of objects uniquely linked inside the widely used Internet set-up known as the "Internet of Things." As IoT is widely used, devices are more susceptible to attacks from hackers. The IoT uses the honeypot concept to thwart these kinds of attacks. The security source of inspiration, a honeypot, is set up to entice criminals by acting as a false alarm. However, this process is limited to a unique machine, while the Honeynet is a network of Honeypots with high levels of interaction with them. As a result, we will apply the honeynet concept to the Internet of Things. This research focuses on how to defend against man-in-the-middle attacks on Internet of Things technology while enabling fraudulent assessment. This study integrates the OAuth authentication technique into the honeynet, enabling us to tackle the Internet of Things (IoT) issue, which is Man-in-the-Middle (MITM) attacks. 

Downloads

Published

2023-12-05

How to Cite

Danial Jamil, Muzammil Ahmad Khan, Zaib Un Nisa Khosa, Mubeen Ashraf, Fahad Atta, & Yousaf Haroon. (2023). Guardian Hive: Safeguarding IoT Devices with Honeypot Security. Journal of Computing & Biomedical Informatics, 6(01), 340–350. Retrieved from https://jcbi.org/index.php/Main/article/view/286