International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 7

Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021


Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana


Abstract: With the increasing use of embedded devices in our daily life, security threats have also been increasing in a proportional rate. However, ensuring security in the embedded systems has become a great challenge not only for the embedded device experts but also for the manufacturers. The problem especially arises because of the limited hardware and software implementation options for the designers. At the same time, companies are trying to keep the vulnerabilities of the operating system of those embedded devices in secret and they are not relieving any necessary security updates quickly. It has become very urgent to ensure proper security of the embedded systems to save it from any major technological disaster near future. In this paper, I have broadly discussed on how to perform attack on embedded devices, So that you can be aware of embedded devices loopholes. Beside this, I have also discussed about the different causes of security threats so that you can protect the systems from the attackers.


Keywords: Hardware hacking, Firmware, Rf attacks, Attacking tools, hardware, software


Edition: Volume 10 Issue 5, May 2021,


Pages: 369 - 371


How to Cite this Article?

Preeti Rana, "Performing Attacks on Radio Frequency and Embedded based Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR21508173151, Volume 10 Issue 5, May 2021, 369 - 371

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Firmware'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Similar Articles with Keyword 'hardware'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 109

Research Paper, Information Technology, India, Volume 2 Issue 5, May 2013

Pages: 53 - 57

Design and interfacing of the optical assembly For Automated Analyzer

Swati Kapoor, Vikas Goel

Share this Article

Similar Articles with Keyword 'software'

Downloads: 101

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Downloads: 103

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Similar Articles with Keyword 'Hardware'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 109

Research Paper, Information Technology, India, Volume 2 Issue 5, May 2013

Pages: 53 - 57

Design and interfacing of the optical assembly For Automated Analyzer

Swati Kapoor, Vikas Goel

Share this Article

Similar Articles with Keyword 'hacking'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 8

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla

Share this Article
Top