Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{144364, author = {Ayush R and M. Baskar and M. Sri Vishnu Vardhan}, title = {Implementation of a Honey Pot Security Mechanism on a Raspberry Pi}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {3}, number = {10}, pages = {238-240}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=144364}, abstract = {In the modern day, most of the enterprises have decided to move their services to a web based system which is more convenient and easily accessible to all the customers. With the advent of Internet of Things, several thousand more devices transmit data through the internet to perform various tasks that optimize our issues. These devices can provide a possible security loophole for unauthorized or illegal access. These peripheral devices that transmit data over a network and this security loophole is what we plan to address by implementing a honey pot mechanism on these very devices and neutralise any intrusion attempts through these access points. This paper in essence discusses a possible mechanism to deal with the security threats that are evolving due to the internet of things.}, keywords = {honey pot; raspberry pi; security; unauthorized access; low interaction}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry