Analysis of the vulnerabilities of the embedded information systems of IoT-devices through the honeypot network implementation
- DOI
- 10.2991/itsmssm-17.2017.75How to use a DOI?
- Keywords
- Internet of Things, IoT-device, smart device, information security, honeypot, IoT-network, attack, trap, unauthorized access
- Abstract
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Anastasia Iskhakova AU - Roman Meshcheryakov AU - Andrey Iskhakov AU - Sergey Timchenko PY - 2017/12 DA - 2017/12 TI - Analysis of the vulnerabilities of the embedded information systems of IoT-devices through the honeypot network implementation BT - Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017) PB - Atlantis Press SP - 363 EP - 367 SN - 2352-538X UR - https://doi.org/10.2991/itsmssm-17.2017.75 DO - 10.2991/itsmssm-17.2017.75 ID - Iskhakova2017/12 ER -