Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT device...
Published in: | Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022 |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239 |
id |
2-s2.0-85146709951 |
---|---|
spelling |
2-s2.0-85146709951 Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B. Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux 2022 Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022 10.1109/ICONDA56696.2022.10000370 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239 Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT devices have many designs and updates. These variations are likely to create security concerns, as there is currently no industry-wide standard for IoT device security. This situation raises security concerns. In addition, since IoT devices hold sensitive and personal information, they are susceptible to a variety of risks as attackers attempt to take advantage of the flaws that exist. As a consequence, ensuring the safety of all applications and devices connected to the IoT is crucial. This paper presents a project that executes penetration testing on a Raspberry Pi 4 that could act as an IoT device and a laptop running on Kali Linux as a hacking tool in order to determine the vulnerabilities of IoT devices. This project successfully conducted cyber-attacks against the exploitable vulnerabilities in the Raspberry Pi 4 acting as an IoT device by executing DoS attack, man-in-the-middle attack and brute force attack. Finally, this paper also presents a set of best practices for mitigating the cyber-attacks. © 2022 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B. |
spellingShingle |
Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B. Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
author_facet |
Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B. |
author_sort |
Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B. |
title |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
title_short |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
title_full |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
title_fullStr |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
title_full_unstemmed |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
title_sort |
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux |
publishDate |
2022 |
container_title |
Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022 |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/ICONDA56696.2022.10000370 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239 |
description |
Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT devices have many designs and updates. These variations are likely to create security concerns, as there is currently no industry-wide standard for IoT device security. This situation raises security concerns. In addition, since IoT devices hold sensitive and personal information, they are susceptible to a variety of risks as attackers attempt to take advantage of the flaws that exist. As a consequence, ensuring the safety of all applications and devices connected to the IoT is crucial. This paper presents a project that executes penetration testing on a Raspberry Pi 4 that could act as an IoT device and a laptop running on Kali Linux as a hacking tool in order to determine the vulnerabilities of IoT devices. This project successfully conducted cyber-attacks against the exploitable vulnerabilities in the Raspberry Pi 4 acting as an IoT device by executing DoS attack, man-in-the-middle attack and brute force attack. Finally, this paper also presents a set of best practices for mitigating the cyber-attacks. © 2022 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1809678025465266176 |