Skip to main content

Exploiting Telnet Security Flaws in the Internet of Things

  • Conference paper
  • First Online:
  • 1541 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 70))

Abstract

The Internet of Things (IoT) is a developing technology which allows any type of network device inside a home to be linked together. IoT is based on older Wireless Sensor Network (WSN) technology and has been reduced to smaller size and scale for home use. However, both the original WSN and developing IoT technology has inherent security flaws. This paper identifies and evaluates security issues and their underlying causes in IoT technology. We focus on IoT reliance on known exploitable network ports and the difficulty of recovering from such attacks. Most IoT implementations utilize Telnet to communicate between devices. We explore the vulnerability of Telnet connections through a simulated IoT environment. Our results show that Telnet vulnerabilities can be exploited by attackers and grant access over IoT devices allowing the modification of devices and subtle spying on any data being transmitted.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDos in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  2. Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: Iotpot: a novel honeypot for revealing current iot threats. J. Inf. Process. 24(3), 522–533 (2016)

    Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  4. Misra, G., Kumar, V., Agarwal, A., Agarwal, K.: Internet of things (IoT)—a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications (an upcoming or future generation computer communication system technology). Am. J. Electr. Electron. Eng. 4(1), 23–32 (2016)

    Google Scholar 

  5. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  6. Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  7. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  8. López, T.S., Kim, D., Canepa, G.H., Koumadi, K.: Integrating wireless sensors and RFID tags into energy-efficient and dynamic context networks. Comput. J. 52(2), 240–267 (2008)

    Article  Google Scholar 

  9. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  10. Gan, G., Lu, Z., Jiang, J.: Internet of things security analysis. In: 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4. IEEE (2011)

    Google Scholar 

  11. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). vol. 3, pp. 648–651. IEEE (2012)

    Google Scholar 

  12. Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R.: Learning internet-of-things security “hands-on”. IEEE Secur. Priv. 14(1), 37–46 (2016)

    Article  Google Scholar 

  13. Zhou, L., Chao, H.C.: Multimedia traffic security architecture for the internet of things. IEEE Netw. 25(3), 35–40 (2011)

    Article  Google Scholar 

  14. Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5–376, IEEE (2010)

    Google Scholar 

  15. Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)

    Article  Google Scholar 

  16. Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  17. Moosavi, S.R., Gia, T.N., Nigussie, E., Rahmani, A.M., Virtanen, S., Tenhunen, H., Isoaho, J.: End-to-end security scheme for mobility enabled healthcare internet of things. Future Gener. Comput. Syst. 64, 108–124 (2016)

    Article  Google Scholar 

  18. Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(2), 76–79 (2017)

    Article  Google Scholar 

  19. Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets. arXiv preprint arXiv:1702.03681 (2017)

  20. Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, vol. 2, 6pp.–1048, Feb 2006

    Google Scholar 

  21. Cook, D.J., Das, S.K.: How smart are our environments? An updated look at the state of the art. Pervasive Mob. Comput. 3(2), 53–73 (2007)

    Article  Google Scholar 

  22. Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Comput. 10(2), 18–25 (2006)

    Article  Google Scholar 

  23. Nittel, S.: A survey of geosensor networks: advances in dynamic environmental monitoring. Sensors 9(7), 5664–5678 (2009)

    Article  Google Scholar 

  24. Khamukhin, A.A., Bertoldo, S.: Spectral analysis of forest fire noise for early detection using wireless sensor networks. In: 2016 International Siberian Conference on Control and Communications (SIBCON), pp. 1–4. IEEE (2016)

    Google Scholar 

  25. Lai, X., Liu, Q., Wei, X., Wang, W., Zhou, G., Han, G.: A survey of body sensor networks. Sensors 13(5), 5406–5447 (2013)

    Article  Google Scholar 

  26. Zulkifli, C.Z., Noor, N.M., Zamzuri, A., Ali, M., Semunab, S.N.: Utilizing active RFID on wireless sensor network platforms for production monitoring. Jurnal TeknologiI 78(2), 63–72 (2016)

    Google Scholar 

  27. Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristen R. Walcott .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Klein, J., Walcott, K.R. (2020). Exploiting Telnet Security Flaws in the Internet of Things. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_51

Download citation

Publish with us

Policies and ethics