Publicación:
Security vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknesses

dc.contributor.authorJorge Sainz-Raso
dc.contributor.authorMartín Gutiérrez, Sergio
dc.contributor.authorDíaz Orueta, Gabriel
dc.contributor.authorPancorbo Castro, Manuel
dc.date.accessioned2024-10-11T11:19:44Z
dc.date.available2024-10-11T11:19:44Z
dc.date.issued2019-11-01
dc.descriptionThis is the accepted manuscript of the article. The trademarked version was first published in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, is available online on the publisher's website: https://doi.org/10.1109/MCE.2019.2941347 Este es el manuscrito aceptado del artículo. La versión registrada fue publicada por primera vez en IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, está disponible en línea en el sitio web del editor: https://doi.org/10.1109/MCE.2019.2941347
dc.description.abstractThe Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment for hobby and education purposes because of its low cost, small size, flexibility, and potential. Nevertheless, Raspberry Pi needs an operating system to work, which exposes it to software vulnerabilities despite the many advantages it provides in comparison with nonoperating system devices. This device also has hardware limitations, which impact on its security. These limitations exist because some concessions had to be done during the design in order to decrease the cost of the device. This article analyzes different hardware and software vulnerabilities that can be found in a Raspberry Pi when using a default installation of different available operating systems. Finally, we propose a list of good practices to minimize the presented issues.en
dc.description.versionversión final
dc.identifier.citationJ. Sainz-Raso, S. Martin, G. Diaz and M. Castro, "Security Vulnerabilities in Raspberry Pi–Analysis of the System Weaknesses," in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, doi: 10.1109/MCE.2019.2941347
dc.identifier.doihttps://doi.org/10.1109/MCE.2019.2941347
dc.identifier.issnISSN: 2162-2248, e- ISSN: 2162-2256
dc.identifier.urihttps://hdl.handle.net/20.500.14468/24023
dc.journal.issue6
dc.journal.titleIEEE Consumer Electronics Magazine
dc.journal.volume8
dc.language.isoen
dc.page.final52
dc.page.initial47
dc.publisherIEEE Xplore
dc.relation.centerFacultades y escuelas::E.T.S. de Ingenieros Industriales
dc.relation.departmentIngeniería Eléctrica, Electrónica, Control, Telemática y Química Aplicada a la Ingeniería
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.es
dc.subject33 Ciencias Tecnológicas
dc.subject.keywordscomputer securityen
dc.subject.keywordsinternet of thingsen
dc.subject.keywordsserversen
dc.subject.keywordspassworden
dc.subject.keywordsuniversal serial busen
dc.subject.keywordssoftware engineeringen
dc.titleSecurity vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknessesen
dc.typeartículoes
dc.typejournal articleen
dspace.entity.typePublication
relation.isAuthorOfPublication634efe13-d6e9-4ddb-b4e6-565d60469512
relation.isAuthorOfPublication2856256b-da19-42ff-9a64-a284b229ecfe
relation.isAuthorOfPublication447e1a7d-3a88-4122-b406-562758871af7
relation.isAuthorOfPublication.latestForDiscovery634efe13-d6e9-4ddb-b4e6-565d60469512
Archivos
Bloque original
Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
MartinGutierrez_Sergio_Security vulnerabili.pdf
Tamaño:
299.22 KB
Formato:
Adobe Portable Document Format
Bloque de licencias
Mostrando 1 - 1 de 1
No hay miniatura disponible
Nombre:
license.txt
Tamaño:
3.62 KB
Formato:
Item-specific license agreed to upon submission
Descripción: