Defending building automation systems using decoy networks - Critical Infrastructure Protection XI Access content directly
Conference Papers Year : 2017

Defending building automation systems using decoy networks


The Internet of Things (IoT) and home and building automation systems are growing fields. Many automation networks use proprietary protocols and few publications have evaluated their security. INSTEON is a leading Internet of Things protocol for home and building automation and, like other proprietary protocols, little research is available relating to its vulnerabilities. This chapter presents techniques for analyzing INSTEON traffic and defending INSTEON networks using virtual decoys. By using a software-defined radio, the packet capture rate for INSTEON traffic is increased from approximately 40% to almost 75% compared with previous research efforts. Additionally, a virtual decoy network has been designed and tested for authenticity and targetability to better protect home and building automation systems.
Fichier principal
Vignette du fichier
460140_1_En_15_Chapter.pdf (670.56 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01819134 , version 1 (20-06-2018)





Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins. Defending building automation systems using decoy networks. 11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.297-317, ⟨10.1007/978-3-319-70395-4_15⟩. ⟨hal-01819134⟩
78 View
130 Download



Gmail Facebook X LinkedIn More