A Honey pot Implementation for security Enhancement in IOT System using AES and Key management

Main Article Content

Pothumani.Parvathi et. al.

Abstract

: Honey pot technology is a trap technology in network defence. It studies and learns the adversary’s attacks by attracting and deceiving attackers and recording their attack behaviours. Target and attack methods to protect real service resources. However, traditional honey pot technology has inherent shortcomings such as static configuration and fixed deployment, and it is very easy to be attacked. Attacker identification bypasses and loses decoy value. Therefore, how to improve the dynamic and deceptive nature of honey pots has become a key issue in the field of honey pots. This paper is the research results in the field of honey pots at home and abroad are sorted out. First, the development history of honey pots is summarized. Then, the key technology of honey pots is the core, and the implementation process, department. It analyzes the method of signature, anti-identification thinking, and the theoretical basis of game; finally, it classifies and narrates the defence results of different honey pots in recent years, and develops the honey pot technology. Development trends are analyzed and stated, aiming at potential security threats, and looking forward to defence applications in emerging areas. In this paper, novel AES algorithm has been developed. In addition key management feature is added which provides more secure for registered users.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
et. al., P. (2021). A Honey pot Implementation for security Enhancement in IOT System using AES and Key management. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 5206–5214. Retrieved from https://turcomat.org/index.php/turkbilmat/article/view/2149
Section
Research Articles