Author : Rohit Kumar 1
Date of Publication :14th March 2017
Abstract: In today’s world, technology is changing almost every second day. This rapidly changing technology offers lots of benefits but also put some great challenges. Smart city is a concept that merges various Information and Communication Technology (ICT) and Internet of Things(IoT) based service solutions, together. Thus, the concept of smart cities uses all possible technologies in the state-of-the-art form. Hence, there is a need to make sure that the no one could use our networks for their own benefits. Malicious users always wait for the perfect opportunities and attack on the most vulnerable part of the network. A strong defense mechanism is needed to defend against them, otherwise the concept of smart cities would only be a chaos. In this paper, we will explain the different types of possible attacks, analyze them and will propose a mechanism to defend against them, based on Honeypot based services.
Reference :
-
- R. Khatoun and S. Zeadally, “ Smart Cities: Basic Concepts, Architectural Issues, and Research Opportunities,” Commun. ACM , vol. 59, no. 8, Aug. 2016, pp. 46–57.
- UN E - Government Survey 2014, “E-Government for the Future We Want,” http://www.un.org/desaB. David et al ., “ Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra,” IEEE Trans. Info. Forensics Security , vol. 11, no. 1, Jan. 2016, pp. 59–73.
- J. H. Cheon and J. Kim, “A Hybrid Scheme of Public Key Encryption and Somewhat Homomorphic Encryption,” IEEE Trans. Info. Forensics Security , vol. 10, no. 5, May 2015, pp. 1052–63.
- H. Demirkan, “A Smart Healthcare Systems Framework,” IT Professional , vol. 15, no. 5, Sept.– Oct. 2013, pp. 38–45
- Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends," in Proceedings of the IEEE, vol. 104, no. 9, pp. 1727-1765, Sept. 2016.
- D. Kapetanovic, G. Zheng and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," in IEEE Communications Magazine, vol. 53, no. 6, pp. 21-27, June 2015.
- C. Clavier, B. Feix, G. Gagnerot and M. Roussellet, "Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis," 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, 2010, pp. 10-19.
- M. A. Chaqfeh, N. Mohamed, "Challenges in middleware solutions for the Internet of Things", Proc. Int. Conf. CTS, pp. 21-26, 2012.
- OmniSecu.com http://www.omnisecu.com/security/infrastructure-andemail-security/low-interaction-honeypots-and-highinteraction-honeypots.php
- P. Diebold, A. Hess, G. Schafer “A Honeypot Architecture for Detecting and Analyzing Unknown
- Network Attacks”, In Proc. Of 14th Kommounikation in Verteilten Systemen 2005 (KiVS05), Kaiserslautern, Germany, February, 2005. http://www2.tkn.tusberlin.de/publications/papers/kivs05.pdf
- http://InformIT.com http://www.informit.com/articles/article.aspx?p=30489 Tech-target.com http://searchsecurity.techtarget.com/feature/Honeypottechnology-How-honeypots-work-in-the-enterprise K. Padayachee, "Aspectising honeytokens to contain the insider threat", IET Information Security, vol. 9, no. 4, pp. 240-247, 2015. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, "Internet of things: A survey on enabling technologies protocols and applications", IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015. K. Zhang, X. Liang, R. Lu, X. Shen, "Sybil attacks and their defenses in the internet of things", IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, 2014. "Cybersecurity and The Internet of Things", EY. global, 2015. N. Kambow, L. Passi, "Honeypots: The need of network security", International Journal of Computer Scienceand Information Technologies, vol. 5, 2014.