Publicación: Security vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknesses
dc.contributor.author | Jorge Sainz-Raso | |
dc.contributor.author | Martín Gutiérrez, Sergio | |
dc.contributor.author | Díaz Orueta, Gabriel | |
dc.contributor.author | Pancorbo Castro, Manuel | |
dc.date.accessioned | 2024-10-11T11:19:44Z | |
dc.date.available | 2024-10-11T11:19:44Z | |
dc.date.issued | 2019-11-01 | |
dc.description | This is the accepted manuscript of the article. The trademarked version was first published in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, is available online on the publisher's website: https://doi.org/10.1109/MCE.2019.2941347 Este es el manuscrito aceptado del artículo. La versión registrada fue publicada por primera vez en IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, está disponible en línea en el sitio web del editor: https://doi.org/10.1109/MCE.2019.2941347 | |
dc.description.abstract | The Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment for hobby and education purposes because of its low cost, small size, flexibility, and potential. Nevertheless, Raspberry Pi needs an operating system to work, which exposes it to software vulnerabilities despite the many advantages it provides in comparison with nonoperating system devices. This device also has hardware limitations, which impact on its security. These limitations exist because some concessions had to be done during the design in order to decrease the cost of the device. This article analyzes different hardware and software vulnerabilities that can be found in a Raspberry Pi when using a default installation of different available operating systems. Finally, we propose a list of good practices to minimize the presented issues. | en |
dc.description.version | versión final | |
dc.identifier.citation | J. Sainz-Raso, S. Martin, G. Diaz and M. Castro, "Security Vulnerabilities in Raspberry Pi–Analysis of the System Weaknesses," in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, doi: 10.1109/MCE.2019.2941347 | |
dc.identifier.doi | https://doi.org/10.1109/MCE.2019.2941347 | |
dc.identifier.issn | ISSN: 2162-2248, e- ISSN: 2162-2256 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14468/24023 | |
dc.journal.issue | 6 | |
dc.journal.title | IEEE Consumer Electronics Magazine | |
dc.journal.volume | 8 | |
dc.language.iso | en | |
dc.page.final | 52 | |
dc.page.initial | 47 | |
dc.publisher | IEEE Xplore | |
dc.relation.center | Facultades y escuelas::E.T.S. de Ingenieros Industriales | |
dc.relation.department | Ingeniería Eléctrica, Electrónica, Control, Telemática y Química Aplicada a la Ingeniería | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/deed.es | |
dc.subject | 33 Ciencias Tecnológicas | |
dc.subject.keywords | computer security | en |
dc.subject.keywords | internet of things | en |
dc.subject.keywords | servers | en |
dc.subject.keywords | password | en |
dc.subject.keywords | universal serial bus | en |
dc.subject.keywords | software engineering | en |
dc.title | Security vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknesses | en |
dc.type | artículo | es |
dc.type | journal article | en |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 634efe13-d6e9-4ddb-b4e6-565d60469512 | |
relation.isAuthorOfPublication | 2856256b-da19-42ff-9a64-a284b229ecfe | |
relation.isAuthorOfPublication | 447e1a7d-3a88-4122-b406-562758871af7 | |
relation.isAuthorOfPublication.latestForDiscovery | 634efe13-d6e9-4ddb-b4e6-565d60469512 |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- MartinGutierrez_Sergio_Security vulnerabili.pdf
- Tamaño:
- 299.22 KB
- Formato:
- Adobe Portable Document Format
Bloque de licencias
1 - 1 de 1
No hay miniatura disponible
- Nombre:
- license.txt
- Tamaño:
- 3.62 KB
- Formato:
- Item-specific license agreed to upon submission
- Descripción: