Abstract
The Internet of Things (IoT) and home and building automation systems are growing fields. Many automation networks use proprietary protocols and few publications have evaluated their security. INSTEON is a leading Internet of Things protocol for home and building automation and, like other proprietary protocols, little research is available relating to its vulnerabilities. This chapter presents techniques for analyzing INSTEON traffic and defending INSTEON networks using virtual decoys. By using a software-defined radio, the packet capture rate for INSTEON traffic is increased from approximately 40% to almost 75% compared with previous research efforts. Additionally, a virtual decoy network has been designed and tested for authenticity and targetability to better protect home and building automation systems.
Original language | English |
---|---|
Title of host publication | Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Revised Selected Papers |
Editors | Sujeet Shenoi, Mason Rice |
Publisher | Springer New York LLC |
Pages | 297-317 |
Number of pages | 21 |
ISBN (Print) | 9783319703947 |
DOIs | |
State | Published - 2017 |
Event | 11th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2017 - Arlington, United States Duration: Mar 13 2017 → Mar 15 2017 |
Publication series
Name | IFIP Advances in Information and Communication Technology |
---|---|
Volume | 512 |
ISSN (Print) | 1868-4238 |
Conference
Conference | 11th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2017 |
---|---|
Country/Territory | United States |
City | Arlington |
Period | 03/13/17 → 03/15/17 |
Funding
This research was partially supported by the U.S. Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).
Keywords
- Home and building automation
- Honeypots
- Internet of things