Constant need to anonymously detect suspicious and conspicuous activity in the IoT landscape, based on the data that is generated by these devices, for example, by trying to understand attack patterns and motives of the attacker through deception in cloud environment.
Value Points:
To conduct state-of-the-art IoT attacks in IoT.
To use honeypots to aid in attack detection in an IoT environment on Cloud environment
to develop a prototype as a proof of concept
Would start with good budget and before time with backup and planning