Version 1
: Received: 18 July 2024 / Approved: 18 July 2024 / Online: 18 July 2024 (23:49:29 CEST)
How to cite:
Houssam, A.; Soubra, H.; Moulla, D. K.; Abran, A. An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints2024, 2024071498. https://doi.org/10.20944/preprints202407.1498.v1
Houssam, A.; Soubra, H.; Moulla, D. K.; Abran, A. An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints 2024, 2024071498. https://doi.org/10.20944/preprints202407.1498.v1
Houssam, A.; Soubra, H.; Moulla, D. K.; Abran, A. An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints2024, 2024071498. https://doi.org/10.20944/preprints202407.1498.v1
APA Style
Houssam, A., Soubra, H., Moulla, D. K., & Abran, A. (2024). An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices. Preprints. https://doi.org/10.20944/preprints202407.1498.v1
Chicago/Turabian Style
Houssam, A., Donatien Koulla Moulla and Alain Abran. 2024 "An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices" Preprints. https://doi.org/10.20944/preprints202407.1498.v1
Abstract
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats. This study introduces a novel approach utilizing hardware honeypots as an additional defensive layer against hardware vulnerabilities, particularly hardware trojans (HTs). HTs pose significant risks to the security of modern integrated circuits (ICs), potentially causing operational failures, denial of service, or data leakage through intentional modifications. The proposed system was implemented on a Raspberry Pi and tested on an emulated HT circuit using a Field-Programmable Gate Array (FPGA). This approach leverages hardware honeypots to detect and mitigate HTs in IoT devices. The results demonstrate that the system effectively detects and mitigates HTs without imposing additional complexity on the IoT devices. The trojan-agnostic solution offers full customization to meet specific security needs, providing a flexible and robust layer of security. The findings provide valuable insights into enhancing the security of IoT devices against hardware-based cyber threats, thereby contributing to the overall resilience of IoT networks. This innovative approach offers a promising solution to address the growing security challenges in IoT environments.
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.