Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks
-
Published:2022-12-31
Issue:3
Volume:14
Page:163-175
-
ISSN:2073-607X
-
Container-title:International Journal of Communication Networks and Information Security (IJCNIS)
-
language:
-
Short-container-title:Int. j. commun. netw. inf. secur.
Author:
Kour Kushnian,Goswami Subhashish,Sharma Dr. Meenakshi,Sivasankar P Thiruvannamalai,Vekariya Dr. Vipul,Kumari Alka
Abstract
Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.
Publisher
Auricle Technologies, Pvt., Ltd.
Subject
Computer Networks and Communications
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on Big Data in Computer Information Security Processing Technology;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01
2. Development and Application of Service Middle Office Full-Link Monitoring System based on Genetic Algorithm;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01
3. Computer Network Security and Practical Technology Application in the Era of Big Data;2023 World Conference on Communication & Computing (WCONF);2023-07-14
4. Cyber Defence Based on Artificial Intelligence and Neural Network Model in Cybersecurity;2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM);2023-04-06