Smart contract honeytoken system using blockchain for Internet of Things device security

Author Identifier

Menaka L. Godakanda: https://orcid.org/0000-0001-8156-2862

David M. Cook: https://orcid.org/0000-0002-2264-8719

Document Type

Conference Proceeding

Publication Title

2025 International Conference on Computer Sciences, Engineering, and Technology Innovation

Publisher

IEEE

School

School of Science

RAS ID

82121

Comments

Godakanda, M. L., & Cook, D. M. (2025). Smart contract honeytoken system using blockchain for Internet of Things device security. In 2025 International Conference on Computer Sciences, Engineering, and Technology Innovation (ICoCSETI) (pp. 570-575). IEEE. https://doi.org/10.1109/ICoCSETI63724.2025.11020086

Abstract

The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, primarily due to their limited computational resources and often inadequate built-in security mechanisms. This paper proposes a novel approach to enhancing IoT security through the implementation of a blockchain-backed honeytoken system. Leveraging Ethereum smart contracts (SCs), we present a decentralized solution that deploys and monitors honeytokens within IoT networks, triggering security measures upon detection of unauthorized access. Our implementation shows the feasibility of integrating blockchain technology with IoT security strategies, providing an additional layer of protection against potential cyber threats. The results indicate effective recognition of unauthorized access attempts, giving enhanced IoT network security. The decentralized nature of our solution ensures tamper-resistant logging and enables automated response mechanisms, significantly improving overall security posture on IoT systems. This research contributes to the body of work on IoT security using a practical, adaptable solution for IoT environments. By combining honeytoken technology with blockchain-based smart contracts, our approach addresses the security challenges posed by IoT devices using a robust framework for detecting and mitigating security breaches.

DOI

10.1109/ICoCSETI63724.2025.11020086

Access Rights

subscription content

Share

 
COinS
 

Link to publisher version (DOI)

10.1109/ICoCSETI63724.2025.11020086