Loading [MathJax]/extensions/MathMenu.js
Security Vulnerabilities in Raspberry Pi–Analysis of the System Weaknesses | IEEE Journals & Magazine | IEEE Xplore

Security Vulnerabilities in Raspberry Pi–Analysis of the System Weaknesses


Abstract:

The Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment ...Show More

Abstract:

The Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment for hobby and education purposes because of its low cost, small size, flexibility, and potential. Nevertheless, Raspberry Pi needs an operating system to work, which exposes it to software vulnerabilities despite the many advantages it provides in comparison with nonoperating system devices. This device also has hardware limitations, which impact on its security. These limitations exist because some concessions had to be done during the design in order to decrease the cost of the device. This article analyzes different hardware and software vulnerabilities that can be found in a Raspberry Pi when using a default installation of different available operating systems. Finally, we propose a list of good practices to minimize the presented issues.
Published in: IEEE Consumer Electronics Magazine ( Volume: 8, Issue: 6, 01 November 2019)
Page(s): 47 - 52
Date of Publication: 31 October 2019

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.