UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1905Z22


Registration ID:
553484

Page Number

170-184

Share This Article


Jetir RMS

Title

Possible Attacks on SOHO and Security Analysis

Abstract

Due to many unusual constraints imposed on their design, embedded systems carry a large set of challenges related to feature implementation and security. Many systems found today prove the high difficulty of achieving the latter, namely designing a secure software architecture. Nevertheless, IoT systems are crucial in many environments ranging from large-scale, tightly secured commercial deployments to relatively unprotected home networks. The danger that embedded devices may face in such versatile environments coupled with the constantly rising popularity and feature scope of IoT systems is one of the main factors which motivated this paper. In this work, we focus on SOHO (Small Office/Home Office) embedded systems equipped with Linux OS. Our goal is to identify and address some of their security problems. We also propose a security testing framework-based on our enhanced methodology. Our methodology focuses on increasing the simplicity and intuitiveness of the tasks as well as making them more straight forward. The methodology covers device data collection, network scanning, traffic gathering, software and hardware testing, then preparing the tools, the attack scenario, and its execution. We also advocate for using free, open-source testing tools. This work also provides security recommendations for manufacturers, solution architects and security researchers in the field of internet of things.

Key Words

Embedded system, IoT, smart home, security, threats, cyber security, counter measures, vulnerabilities.

Cite This Article

"Possible Attacks on SOHO and Security Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.170-184, May-2019, Available :http://www.jetir.org/papers/JETIR1905Z22.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Possible Attacks on SOHO and Security Analysis", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp170-184, May-2019, Available at : http://www.jetir.org/papers/JETIR1905Z22.pdf

Publication Details

Published Paper ID: JETIR1905Z22
Registration ID: 553484
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 170-184
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00064

Print This Page

Current Call For Paper

Jetir RMS