2018
DOI: 10.3837/tiis.2018.09.021
|View full text |Cite
|
Sign up to set email alerts
|

HoneyThing: A New Honeypot Design for CPE Devices

Abstract: The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Hackers and attackers may gain information about customers and hospitality organizations (Mercan et al , 2020). Erdem et al (2018) asserted that IoT devices face cyber-criminals because of the process of transferring valuable data. Hence, hospitality firms may be afraid of IoT adoption in daily processes.…”
Section: Review Findingsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hackers and attackers may gain information about customers and hospitality organizations (Mercan et al , 2020). Erdem et al (2018) asserted that IoT devices face cyber-criminals because of the process of transferring valuable data. Hence, hospitality firms may be afraid of IoT adoption in daily processes.…”
Section: Review Findingsmentioning
confidence: 99%
“…They also should provide hospitality sectors with security solutions, such as firewalls, honeypots, IPDS and antivirus to secure IoT technologies from cybercriminals. In addition, IoT manufacturers have to develop a honeypot system to capture and reveal network attacks against devices of client premises, such as modems and routers (Erdem et al , 2018).…”
Section: Practical Implications and Recommendationsmentioning
confidence: 99%
See 1 more Smart Citation