Exploiting Telnet Security Flaws in the Internet of Things
Abstract
The Internet of Things (IoT) is a developing technology which allows any type of network device inside a home to be linked together. IoT is based on older Wireless Sensor Network (WSN) technology and has been reduced to smaller size and scale for home use. However, both the original WSN and developing IoT technology has inherent security flaws. This paper identifies and evaluates security issues and their underlying causes in IoT technology. We focus on IoT reliance on known exploitable network ports and the difficulty of recovering from such attacks. Most IoT implementations utilize Telnet to communicate between devices. We explore the vulnerability of Telnet connections through a simulated IoT environment. Our results show that Telnet vulnerabilities can be exploited by attackers and grant access over IoT devices allowing the modification of devices and subtle spying on any data being transmitted.
Keywords
Internet of Things (IoT) Telnet Vulnerabilities SecurityReferences
- 1.Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDos in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRefGoogle Scholar
- 2.Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: Iotpot: a novel honeypot for revealing current iot threats. J. Inf. Process. 24(3), 522–533 (2016)Google Scholar
- 3.Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
- 4.Misra, G., Kumar, V., Agarwal, A., Agarwal, K.: Internet of things (IoT)—a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications (an upcoming or future generation computer communication system technology). Am. J. Electr. Electron. Eng. 4(1), 23–32 (2016)Google Scholar
- 5.Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRefGoogle Scholar
- 6.Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRefGoogle Scholar
- 7.Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRefGoogle Scholar
- 8.López, T.S., Kim, D., Canepa, G.H., Koumadi, K.: Integrating wireless sensors and RFID tags into energy-efficient and dynamic context networks. Comput. J. 52(2), 240–267 (2008)CrossRefGoogle Scholar
- 9.Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)CrossRefGoogle Scholar
- 10.Gan, G., Lu, Z., Jiang, J.: Internet of things security analysis. In: 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4. IEEE (2011)Google Scholar
- 11.Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). vol. 3, pp. 648–651. IEEE (2012)Google Scholar
- 12.Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R.: Learning internet-of-things security “hands-on”. IEEE Secur. Priv. 14(1), 37–46 (2016)CrossRefGoogle Scholar
- 13.Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Netw. 25(3), 35–40 (2011)CrossRefGoogle Scholar
- 14.Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5–376, IEEE (2010)Google Scholar
- 15.Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRefGoogle Scholar
- 16.Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
- 17.Moosavi, S.R., Gia, T.N., Nigussie, E., Rahmani, A.M., Virtanen, S., Tenhunen, H., Isoaho, J.: End-to-end security scheme for mobility enabled healthcare internet of things. Future Gener. Comput. Syst. 64, 108–124 (2016)CrossRefGoogle Scholar
- 18.Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(2), 76–79 (2017)CrossRefGoogle Scholar
- 19.Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets. arXiv preprint arXiv:1702.03681 (2017)
- 20.Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, vol. 2, 6pp.–1048, Feb 2006Google Scholar
- 21.Cook, D.J., Das, S.K.: How smart are our environments? An updated look at the state of the art. Pervasive Mob. Comput. 3(2), 53–73 (2007)CrossRefGoogle Scholar
- 22.Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Comput. 10(2), 18–25 (2006)CrossRefGoogle Scholar
- 23.Nittel, S.: A survey of geosensor networks: advances in dynamic environmental monitoring. Sensors 9(7), 5664–5678 (2009)CrossRefGoogle Scholar
- 24.Khamukhin, A.A., Bertoldo, S.: Spectral analysis of forest fire noise for early detection using wireless sensor networks. In: 2016 International Siberian Conference on Control and Communications (SIBCON), pp. 1–4. IEEE (2016)Google Scholar
- 25.Lai, X., Liu, Q., Wei, X., Wang, W., Zhou, G., Han, G.: A survey of body sensor networks. Sensors 13(5), 5406–5447 (2013)CrossRefGoogle Scholar
- 26.Zulkifli, C.Z., Noor, N.M., Zamzuri, A., Ali, M., Semunab, S.N.: Utilizing active RFID on wireless sensor network platforms for production monitoring. Jurnal TeknologiI 78(2), 63–72 (2016)Google Scholar
- 27.Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2011)CrossRefGoogle Scholar