Defending building automation systems using decoy networks

Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The Internet of Things (IoT) and home and building automation systems are growing fields. Many automation networks use proprietary protocols and few publications have evaluated their security. INSTEON is a leading Internet of Things protocol for home and building automation and, like other proprietary protocols, little research is available relating to its vulnerabilities. This chapter presents techniques for analyzing INSTEON traffic and defending INSTEON networks using virtual decoys. By using a software-defined radio, the packet capture rate for INSTEON traffic is increased from approximately 40% to almost 75% compared with previous research efforts. Additionally, a virtual decoy network has been designed and tested for authenticity and targetability to better protect home and building automation systems.

Original languageEnglish
Title of host publicationCritical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Revised Selected Papers
EditorsSujeet Shenoi, Mason Rice
PublisherSpringer New York LLC
Pages297-317
Number of pages21
ISBN (Print)9783319703947
DOIs
StatePublished - 2017
Externally publishedYes
Event11th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2017 - Arlington, United States
Duration: Mar 13 2017Mar 15 2017

Publication series

NameIFIP Advances in Information and Communication Technology
Volume512
ISSN (Print)1868-4238

Conference

Conference11th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2017
Country/TerritoryUnited States
CityArlington
Period03/13/1703/15/17

Funding

This research was partially supported by the U.S. Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

FundersFunder number
U.S. Department of Homeland Security

    Keywords

    • Home and building automation
    • Honeypots
    • Internet of things

    Fingerprint

    Dive into the research topics of 'Defending building automation systems using decoy networks'. Together they form a unique fingerprint.

    Cite this