Remote Router Access Protocols: Security Implications of TELNET and SSH

Article Sidebar

Main Article Content

Satyavan Kunjir
Renuka Kulkarni

Abstract - A key component in current network administration is remote access to network devices, which helps effective management and troubleshooting. TELNET and Secure Shell (SSH), two of the protocols that provide this kind of access, are widely used for their functions in router setup and upkeep. The security implications of remote router access via TELNET and SSH are critically examined in this work. Due to its early architecture and lack of encryption, TELNET makes network traffic extremely vulnerable to eavesdropping in modern settings. On the other hand, SSH improves the secrecy and integrity of data by providing secure communication channels and strong authentication.

Remote Router Access Protocols: Security Implications of TELNET and SSH. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(13), 223-226. https://doi.org/10.51583/IJLTEMAS.2025.1413SP045

Downloads

References

https://info.pivitglobal.com/resources/telnet-versus-ssh

https://www.geeksforgeeks.org/computer-networks/introduction-to-ssh-secure-shell-keys/

https://www.geeksforgeeks.org/computer-networks/how-to-configure-ssh-on-cisco-routers-and-switches/

Nicol, D. M., Sanders, W. H., & Trivedi, K. S. (2017). "Security Evaluation of Network Protocols in Critical Infrastructure."IEEE Transactions on Secure Computing.

Sivaraman, V., et al. (2016). "Security Concerns in Home Routers and IoT Devices."IEEE SecureComm.

Article Details

How to Cite

Remote Router Access Protocols: Security Implications of TELNET and SSH. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(13), 223-226. https://doi.org/10.51583/IJLTEMAS.2025.1413SP045