Wireless Sensor Networks (WSN) as emerging technology are becoming even more important through the technisation of industry, our mobility driven lives and our “smart homes”. In a world where a plethora of our devices interact to serve our purposes, it's clear that competing groups may want to use these devices for their own objectives.
Therefore we focus on honeypots for WSNs as an opportunity to become acquainted with the techniques used to misuse or even to take-over WSNs. This knowledge has the potential to improve the WSN designs and even those already deployed in the field.
Honeypots in information security can be found in computer networks where a client-server model is applied and client-honeypots are very different from server-honeypots. In WSNs the client-server model is not applicable. This was the motivation behind determining whether it would be a honeypot at all if brought into this domain. What if we have to call it something else? The uncertainty of a missing naming convention leading to ambiguous conversations about this new topic needs discussion. In this paper we show the classic definition, discuss the categorisation and give recommendations for further use as well as the wording that will be used further on in the following research.