Secure Shell Protocol (SSH Protocol)

by Oct 3, 2020IoT Security

What is SSH Protocol?

Secure Shell Protocol or SSH Protocol is a protocol for secure remote login over an insecure network. SSH achieves to provide a secure channel over the insecure channel by using client-server architecture, connecting an SSH client to the SSH server. The client initiates the connection by sending a request to initiate contact with the server. The server then sends the public key to the client to establish a connection. Next, the parameter negotiation takes place between the server and the client and the secure channel is available for use. Finally, the user has to login to the server host OS.

Setup for Secure Shell Protocol
Setup for SSH Protocol

Strong Authentication with Secure Shell Protocol keys

There are several ways of implementing Secure Shell Protocol:

  • Use the automatically generated public-private keys pairs to establish a secure encrypted network connection. Next, use the password authentication to log on.
  • Use a public-private key pair generated manually to perform authentication. Thus allowing users to log in without having to provide a password. In this case, anyone can produce a matching pair of different public-private keys. All computers have a public key that must allow access to the owner of the matching private key. transfer of private key never takes place during authentication as the authentication is based on it. SSH verifies the user by checking whether the person offering the public key owns the matching private key or not.

Strong Encryption and Integrity Protection

The SSH Client establishes a connection with the server. The encryption of the transmitting data takes place according to the negotiation parameters in the setup. In this negotiation, the client and server agree on the encryption algorithm. Generation of the Encrypted key takes place. The traffic between the parties that are communicating is protected using strong encryption algorithms. The SSH protocol even includes a mechanism for ensuring the integrity of the data being transmitted. This is achieved by using standard hash algorithms such as SHA-2 commonly known as Standard Hashing Algorithm.

Secure Shell Protocol Encryption
SSH Encryption

The Architecture of Secure Shell Protocol

Secure Shell Protocol has internal Architecture. Well-Separated layers are as follows:

  • The Transport Layer: The transport layer is responsible for the initial key exchange. It also handles Server Authentication and sets up encryption and integrity verification.
  • The User Authentication Layer: The user authentication layer is responsible for client authentication and provides a number of authentication methods. Authentication is client-driven. Widely used authentications are Password, Public-key, and keyboard-interactive (OTP).
  • The Connection Layer: The connection layer is responsible to define the concept of channels, and provide channel requests and global requests. Using this request, We provide Secure shell Protocol Services. A single Secure Shell connection can host multiple channels simultaneously, that too, transmitting data in both directions. Different types include shell, direct-tcpip, forwarded-tcpip.
SSH Architecture

Applications of Secure shell Protocol

The primary use of SSH is to log in to a remote machine and execute the command. In addition, it can also support tunneling, forwarding TCP ports, and X11 connections. Uses of Secure Shell Protocol are:

  • To set up automatic (passwordless) login to a remote server.
  • For backing up, copy and mirror files efficiently and securely.
  • For forwarding a port.
  • To use a full-fledged encrypted VPN.
  • To develop a mobile or embedded device that supports SSH.

Creating a multiplication Skill in Alexa using python

Written By Monisha Macharla

Hi, I'm Monisha. I am a tech blogger and a hobbyist. I am eager to learn and explore tech related stuff! also, I wanted to deliver you the same as much as the simpler way with more informative content. I generally appreciate learning by doing, rather than only learning. Thank you for reading my blog! Happy learning!

RELATED POSTS

Logic Locking: Advancement to IoT Security

Logic Locking: Advancement to IoT Security

Logic locking technology is one of the latest advancement in the improvement of IoT security to protect your devices from cyber attacks. Before knowing that lets talk about Internet of Things (IoT). What is IoT ? The Internet of Things (IoT) is a new, but at the same...

Security Tools For IoT

Security Tools For IoT

Security is required for the connecting things on internet and some of the tools and solutions used are: 1.M2MLabs Mainspring: M2MLabs is a set of M2MLabs. Mainspring is an open-source technology platform for developing M2M (machine-to-machine) applications. Including...

Cryptography and Security in the Internet of Things

Cryptography and Security in the Internet of Things

Cryptography is the process of securing information by transforming the information into a secure format and vice versa. In other words, encrypting and decrypting the formation to secure it. Firstly, let's understand the security issues in IoT to understand the...

Advanced Encryption Standard – AES Algorithm

Advanced Encryption Standard – AES Algorithm

Encryption is a key feature for securing information. Encryption is basically converting any normal yet confidential message to an encoded and unreadable format for high-security purposes. This unreadable text is known as ciphertext. There are many Encryption...

Cloud Security

Cloud Security

Cloud security consists of several protocols and policies. There are several procedures and technologies which are required to maintain cloud-based systems. Also, it helps in protecting cloud data and giving protection to the privacy of users. Set of protocols are...

Hashing in IoT

Hashing in IoT

Hashing is transforming a string of characters into a usually shorter value of a fixed length representing the original string. Besides faster data recovery, Hashing is also used to encrypt and decrypt digital signature. Introduction The number of interconnected...

Blockless DAG IoT network

Blockless DAG IoT network

Technology is constantly evolving and improving. Phones were once connected via a wire, then became wireless, and we now have smart mobile devices. The history of technology goes a long way to prove that it is indeed true that all technology constantly upgrades. True...

VIDEOS – FOLLOW US ON YOUTUBE

EXPLORE OUR IOT PROJECTS

IoT Smart Gardening System – ESP8266, MQTT, Adafruit IO

Gardening is always a very calming pastime. However, our gardens' plants may not always receive the care they require due to our active lifestyles. What if we could remotely keep an eye on their health and provide them with the attention they require? In this article,...

How to Simulate IoT projects using Cisco Packet Tracer

In this tutorial, let's learn how to simulate the IoT project using the Cisco packet tracer. As an example, we shall build a simple Home Automation project to control and monitor devices. Introduction Firstly, let's quickly look at the overview of the software. Packet...

All you need to know about integrating NodeMCU with Ubidots over MQTT

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

All you need to know about integrating NodeMCU with Ubidots over Https

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

How to design a Wireless Blind Stick using nRF24L01 Module?

Introduction Let's learn to design a low-cost wireless blind stick using the nRF24L01 transceiver module. So the complete project is divided into the transmitter part and receiver part. Thus, the Transmitter part consists of an Arduino Nano microcontroller, ultrasonic...

Sending Temperature data to ThingSpeak Cloud and Visualize

In this article, we are going to learn “How to send temperature data to ThingSpeak Cloud?”. We can then visualize the temperature data uploaded to ThingSpeak Cloud anywhere in the world. But "What is ThingSpeak?” ThingSpeak is an open-source IoT platform that allows...

Amaze your friend with latest tricks of Raspberry Pi and Firebase

Introduction to our Raspberry Pi and Firebase trick Let me introduce you to the latest trick of Raspberry Pi and Firebase we'll be using to fool them. It begins with a small circuit to connect a temperature sensor and an Infrared sensor with Raspberry Pi. The circuit...

How to implement Machine Learning on IoT based Data?

Introduction The industrial scope for the convergence of the Internet of Things(IoT) and Machine learning(ML) is wide and informative. IoT renders an enormous amount of data from various sensors. On the other hand, ML opens up insight hidden in the acquired data....

Smart Display Board based on IoT and Google Firebase

Introduction In this tutorial, we are going to build a Smart Display Board based on IoT and Google Firebase by using NodeMCU8266 (or you can even use NodeMCU32) and LCD. Generally, in shops, hotels, offices, railway stations, notice/ display boards are used. They are...

Smart Gardening System – GO GREEN Project

Automation of farm activities can transform agricultural domain from being manual into a dynamic field to yield higher production with less human intervention. The project Green is developed to manage farms using modern information and communication technologies....