In the modern day, most of the enterprises have decided to move their services to a web based system which is more convenient and easily accessible to all the customers. With the advent of Internet of Things, several thousand more devices transmit data through the internet to perform various tasks that optimize our issues. These devices can provide a possible security loophole for unauthorized or illegal access. These peripheral devices that transmit data over a network and this security loophole is what we plan to address by implementing a honey pot mechanism on these very devices and neutralise any intrusion attempts through these access points. This paper in essence discusses a possible mechanism to deal with the security threats that are evolving due to the internet of things.
Article Details
Unique Paper ID: 144364
Publication Volume & Issue: Volume 3, Issue 10
Page(s): 238 - 240
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024