A comprehensive methodology for deploying IoT honeypots

TitleA comprehensive methodology for deploying IoT honeypots
Publication TypeConference Paper
Year of Publication2018
AuthorsA. Acien, A. Nieto, G. Fernandez, and J. Lopez
Conference Name15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018)
VolumeLNCS 11033
Pagination229–243
Date Published09/2018
PublisherSpringer Nature Switzerland AG
Conference LocationRegensburg (Germany)
KeywordsHoneypot, IoT, methodology, security
Abstract

Recent news have raised concern regarding the security on the IoT field. Vulnerabilities in devices are arising and honeypots are an excellent way to cope with this problem. In this work, current solutions for honeypots in the IoT context, and other solutions adaptable to it are analyzed in order to set the basis for a methodology that allows deployment of IoT honeypot.

DOI10.1007/978-3-319-98385-1_16
Citation Key1701
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/1701.pdf

Supported by IoTest SMOG