Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux

Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT device...

Full description

Bibliographic Details
Published in:Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022
Main Author: Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2022
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239
id 2-s2.0-85146709951
spelling 2-s2.0-85146709951
Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
2022
Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022


10.1109/ICONDA56696.2022.10000370
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239
Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT devices have many designs and updates. These variations are likely to create security concerns, as there is currently no industry-wide standard for IoT device security. This situation raises security concerns. In addition, since IoT devices hold sensitive and personal information, they are susceptible to a variety of risks as attackers attempt to take advantage of the flaws that exist. As a consequence, ensuring the safety of all applications and devices connected to the IoT is crucial. This paper presents a project that executes penetration testing on a Raspberry Pi 4 that could act as an IoT device and a laptop running on Kali Linux as a hacking tool in order to determine the vulnerabilities of IoT devices. This project successfully conducted cyber-attacks against the exploitable vulnerabilities in the Raspberry Pi 4 acting as an IoT device by executing DoS attack, man-in-the-middle attack and brute force attack. Finally, this paper also presents a set of best practices for mitigating the cyber-attacks. © 2022 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
spellingShingle Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
author_facet Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
author_sort Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
title Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
title_short Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
title_full Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
title_fullStr Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
title_full_unstemmed Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
title_sort Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
publishDate 2022
container_title Proceedings - 2022 International Conference on Computer and Drone Applications, IConDA 2022
container_volume
container_issue
doi_str_mv 10.1109/ICONDA56696.2022.10000370
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146709951&doi=10.1109%2fICONDA56696.2022.10000370&partnerID=40&md5=a853ee44c0d0c520977af4368979a239
description Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT devices have many designs and updates. These variations are likely to create security concerns, as there is currently no industry-wide standard for IoT device security. This situation raises security concerns. In addition, since IoT devices hold sensitive and personal information, they are susceptible to a variety of risks as attackers attempt to take advantage of the flaws that exist. As a consequence, ensuring the safety of all applications and devices connected to the IoT is crucial. This paper presents a project that executes penetration testing on a Raspberry Pi 4 that could act as an IoT device and a laptop running on Kali Linux as a hacking tool in order to determine the vulnerabilities of IoT devices. This project successfully conducted cyber-attacks against the exploitable vulnerabilities in the Raspberry Pi 4 acting as an IoT device by executing DoS attack, man-in-the-middle attack and brute force attack. Finally, this paper also presents a set of best practices for mitigating the cyber-attacks. © 2022 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1809678025465266176