Next Article in Journal
Evaluation of Wearable Electronics for Epilepsy: A Systematic Review
Next Article in Special Issue
Optimization Model for IoT-Aware Energy Exchange in Energy Communities for Residential Users
Previous Article in Journal
Transmission Grid Expansion Planning of a High Proportion Renewable Energy Power System Based on Flexibility and Economy
Open AccessFeature PaperArticle

Vulnerabilities’ Assessment and Mitigation Strategies for the Small Linux Server, Onion Omega2

1
Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 4R2, Canada
2
Research & Development Department, Technology Sanstream, Ottawa, ON K2R 1C1, Canada
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(6), 967; https://doi.org/10.3390/electronics9060967
Received: 8 May 2020 / Revised: 1 June 2020 / Accepted: 5 June 2020 / Published: 10 June 2020
(This article belongs to the Special Issue Emerging Internet of Things Solutions and Technologies)
The merger of SCADA (supervisory control and data acquisition) and IoTs (internet of things) technologies allows end-users to monitor and control industrial components remotely. However, this transformation opens up a new set of attack vectors and unpredicted vulnerabilities in SCADA/IoT field devices. Proper identification, assessment, and verification of each SCADA/IoT component through advanced scanning and penetration testing tools in the early stage is a crucial step in risk assessment. The Omega2, a small Linux server from Onion™, is used to develop various SCADA/IoT systems and is a key component of nano power grid systems. In this paper, we report product level vulnerabilities of Onion Omega2 that we have uncovered using advanced vulnerability scanning tools. Through this research, we would like to assist vendors, asset owners, network administrators, and security professionals by creating an awareness of the vulnerabilities of Onion Omega2 and by suggesting effective mitigations and security best practices. View Full-Text
Keywords: SCADA; IoT; embedded devices; vulnerability assessment; webserver; Onion Omega2 SCADA; IoT; embedded devices; vulnerability assessment; webserver; Onion Omega2
Show Figures

Figure 1

MDPI and ACS Style

Upadhyay, D.; Sampalli, S.; Plourde, B. Vulnerabilities’ Assessment and Mitigation Strategies for the Small Linux Server, Onion Omega2. Electronics 2020, 9, 967.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop