Advertisement

Exploiting Telnet Security Flaws in the Internet of Things

  • James Klein
  • Kristen R. WalcottEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)

Abstract

The Internet of Things (IoT) is a developing technology which allows any type of network device inside a home to be linked together. IoT is based on older Wireless Sensor Network (WSN) technology and has been reduced to smaller size and scale for home use. However, both the original WSN and developing IoT technology has inherent security flaws. This paper identifies and evaluates security issues and their underlying causes in IoT technology. We focus on IoT reliance on known exploitable network ports and the difficulty of recovering from such attacks. Most IoT implementations utilize Telnet to communicate between devices. We explore the vulnerability of Telnet connections through a simulated IoT environment. Our results show that Telnet vulnerabilities can be exploited by attackers and grant access over IoT devices allowing the modification of devices and subtle spying on any data being transmitted.

Keywords

Internet of Things (IoT) Telnet Vulnerabilities Security 

References

  1. 1.
    Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDos in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRefGoogle Scholar
  2. 2.
    Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: Iotpot: a novel honeypot for revealing current iot threats. J. Inf. Process. 24(3), 522–533 (2016)Google Scholar
  3. 3.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  4. 4.
    Misra, G., Kumar, V., Agarwal, A., Agarwal, K.: Internet of things (IoT)—a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications (an upcoming or future generation computer communication system technology). Am. J. Electr. Electron. Eng. 4(1), 23–32 (2016)Google Scholar
  5. 5.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRefGoogle Scholar
  6. 6.
    Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRefGoogle Scholar
  7. 7.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRefGoogle Scholar
  8. 8.
    López, T.S., Kim, D., Canepa, G.H., Koumadi, K.: Integrating wireless sensors and RFID tags into energy-efficient and dynamic context networks. Comput. J. 52(2), 240–267 (2008)CrossRefGoogle Scholar
  9. 9.
    Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)CrossRefGoogle Scholar
  10. 10.
    Gan, G., Lu, Z., Jiang, J.: Internet of things security analysis. In: 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4. IEEE (2011)Google Scholar
  11. 11.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). vol. 3, pp. 648–651. IEEE (2012)Google Scholar
  12. 12.
    Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R.: Learning internet-of-things security “hands-on”. IEEE Secur. Priv. 14(1), 37–46 (2016)CrossRefGoogle Scholar
  13. 13.
    Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Netw. 25(3), 35–40 (2011)CrossRefGoogle Scholar
  14. 14.
    Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5–376, IEEE (2010)Google Scholar
  15. 15.
    Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRefGoogle Scholar
  16. 16.
    Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
  17. 17.
    Moosavi, S.R., Gia, T.N., Nigussie, E., Rahmani, A.M., Virtanen, S., Tenhunen, H., Isoaho, J.: End-to-end security scheme for mobility enabled healthcare internet of things. Future Gener. Comput. Syst. 64, 108–124 (2016)CrossRefGoogle Scholar
  18. 18.
    Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(2), 76–79 (2017)CrossRefGoogle Scholar
  19. 19.
    Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets. arXiv preprint arXiv:1702.03681 (2017)
  20. 20.
    Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, vol. 2, 6pp.–1048, Feb 2006Google Scholar
  21. 21.
    Cook, D.J., Das, S.K.: How smart are our environments? An updated look at the state of the art. Pervasive Mob. Comput. 3(2), 53–73 (2007)CrossRefGoogle Scholar
  22. 22.
    Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Comput. 10(2), 18–25 (2006)CrossRefGoogle Scholar
  23. 23.
    Nittel, S.: A survey of geosensor networks: advances in dynamic environmental monitoring. Sensors 9(7), 5664–5678 (2009)CrossRefGoogle Scholar
  24. 24.
    Khamukhin, A.A., Bertoldo, S.: Spectral analysis of forest fire noise for early detection using wireless sensor networks. In: 2016 International Siberian Conference on Control and Communications (SIBCON), pp. 1–4. IEEE (2016)Google Scholar
  25. 25.
    Lai, X., Liu, Q., Wei, X., Wang, W., Zhou, G., Han, G.: A survey of body sensor networks. Sensors 13(5), 5406–5447 (2013)CrossRefGoogle Scholar
  26. 26.
    Zulkifli, C.Z., Noor, N.M., Zamzuri, A., Ali, M., Semunab, S.N.: Utilizing active RFID on wireless sensor network platforms for production monitoring. Jurnal TeknologiI 78(2), 63–72 (2016)Google Scholar
  27. 27.
    Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.University of ColoradoColorado SpringsUSA

Personalised recommendations