Files
Coche_73141700_Hernandez_54671900_2024.pdf
UCLouvain restricted access - Adobe PDF
- 6.64 MB
Details
- Supervisors
- Faculty
- Degree label
- Abstract
- Through a huge network of connected devices, the Internet of Things (IoT) has drastically revolutionized both personal and industrial surroundings, providing greater efficiency and communication. However, despite many benefits, IoT devices have also triggered a number of security concerns. Indeed, because of their frequently constrained processing power, memory and battery life, these devices make it challenging to install strong security features. The issue is strengthened by the fact that various manufacturers’ security standards are not standardized, which results in devices having old software, unencrypted communication channels, as well as default passwords. Hence, these flaws lead to IoT devices being vulnerable to cyberattacks, which puts both infrastructure integrity and privacy at serious risk. The Matter protocol, originally called Project Connected Home over IP (CHIP), was created as a solution to these problems through the creation of a standardized, safe and compatible framework for smart home devices. Matter seeks to establish a standardized architecture for interoperability and communication across many platforms and ecosystems. In addition, the Thread protocol provides an IoT-specific low-power, dependable networking solution to support this. When combined, Matter and Thread offer a strong basis for creating safe and compatible IoT networks. Despite these standards’ security enhancement, IoT threats are constantly evolving, making it necessary to develop early measures that are able to identify and reduce these risks. Using the Matter over Thread protocol framework to install honeypots in Internet of Things environments is way to do this. Crucially, decoy systems called honeypots are created to mimic susceptible IoT devices, in order to examine malicious activities. Honeypots allow security experts to analyze the strategies and actions of attackers, gaining important information that may be used to improve defenses, fix vulnerabilities, and create mitigation plans.