Remote Router Access Protocols: Security Implications of TELNET and SSH
Article Sidebar
Main Article Content
Abstract - A key component in current network administration is remote access to network devices, which helps effective management and troubleshooting. TELNET and Secure Shell (SSH), two of the protocols that provide this kind of access, are widely used for their functions in router setup and upkeep. The security implications of remote router access via TELNET and SSH are critically examined in this work. Due to its early architecture and lack of encryption, TELNET makes network traffic extremely vulnerable to eavesdropping in modern settings. On the other hand, SSH improves the secrecy and integrity of data by providing secure communication channels and strong authentication.
Downloads
References
https://info.pivitglobal.com/resources/telnet-versus-ssh
https://www.geeksforgeeks.org/computer-networks/introduction-to-ssh-secure-shell-keys/
https://www.geeksforgeeks.org/computer-networks/how-to-configure-ssh-on-cisco-routers-and-switches/
Nicol, D. M., Sanders, W. H., & Trivedi, K. S. (2017). "Security Evaluation of Network Protocols in Critical Infrastructure."IEEE Transactions on Secure Computing.
Sivaraman, V., et al. (2016). "Security Concerns in Home Routers and IoT Devices."IEEE SecureComm.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.