HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Defending building automation systems using decoy networks

Abstract : The Internet of Things (IoT) and home and building automation systems are growing fields. Many automation networks use proprietary protocols and few publications have evaluated their security. INSTEON is a leading Internet of Things protocol for home and building automation and, like other proprietary protocols, little research is available relating to its vulnerabilities. This chapter presents techniques for analyzing INSTEON traffic and defending INSTEON networks using virtual decoys. By using a software-defined radio, the packet capture rate for INSTEON traffic is increased from approximately 40% to almost 75% compared with previous research efforts. Additionally, a virtual decoy network has been designed and tested for authenticity and targetability to better protect home and building automation systems.
Document type :
Conference papers
Complete list of metadata

Cited literature [20 references]  Display  Hide  Download

Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Wednesday, June 20, 2018 - 9:23:46 AM
Last modification on : Wednesday, June 20, 2018 - 9:34:10 AM
Long-term archiving on: : Tuesday, September 25, 2018 - 6:48:41 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins. Defending building automation systems using decoy networks. 11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.297-317, ⟨10.1007/978-3-319-70395-4_15⟩. ⟨hal-01819134⟩



Record views


Files downloads