Preprint Article Version 1 This version is not peer-reviewed

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

Version 1 : Received: 18 July 2024 / Approved: 18 July 2024 / Online: 18 July 2024 (23:49:29 CEST)

How to cite: Houssam, A.; Soubra, H.; Moulla, D. K.; Abran, A. An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints 2024, 2024071498. https://doi.org/10.20944/preprints202407.1498.v1 Houssam, A.; Soubra, H.; Moulla, D. K.; Abran, A. An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints 2024, 2024071498. https://doi.org/10.20944/preprints202407.1498.v1

Abstract

The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats. This study introduces a novel approach utilizing hardware honeypots as an additional defensive layer against hardware vulnerabilities, particularly hardware trojans (HTs). HTs pose significant risks to the security of modern integrated circuits (ICs), potentially causing operational failures, denial of service, or data leakage through intentional modifications. The proposed system was implemented on a Raspberry Pi and tested on an emulated HT circuit using a Field-Programmable Gate Array (FPGA). This approach leverages hardware honeypots to detect and mitigate HTs in IoT devices. The results demonstrate that the system effectively detects and mitigates HTs without imposing additional complexity on the IoT devices. The trojan-agnostic solution offers full customization to meet specific security needs, providing a flexible and robust layer of security. The findings provide valuable insights into enhancing the security of IoT devices against hardware-based cyber threats, thereby contributing to the overall resilience of IoT networks. This innovative approach offers a promising solution to address the growing security challenges in IoT environments.

Keywords

IoT; Honeypots; Hardware Trojan; VHDL; FPGA; Raspberry Pi; Python; Socket Programming

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.