Beruflich Dokumente
Kultur Dokumente
AbstractThe consequences of security problems In Section III, we discuss the problems of each layer,
are increasingly serious. These problems can now lead analyzing their protocols, sensors and how used in
to personal injury, prolonged downtime and attacks aimed at its weak points. In section IV, we
irreparable damage to capital goods. To achieve this, describe attacks that affect the tags, reader and
systems require end-to-end security solutions that network protocol. We also provide possible ways to
cover the layers of connectivity, furthermore, counter these attacks. In the last section, we cite some
guarantee the privatization and protection of data solutions proposed by the various companies and
circulated via networks. In this paper, we will give a
organizations in the field of IoT security. Finally,
definition to the Internet of things, try to dissect its
Section V concludes the paper which was just a
architecture (protocols, layers, entities ...), thus giving
reflection on this complicated subject, and gives
a state of the art of security in the field of internet of
possible future directions.
things (Faults detected in each layer ...), finally,
mention the solutions proposed until now to help
researchers start their researches on internet of things
security subject.
I. INTRODUCTION
T
he beginning of the web is marked by the
appearance of the web 0.1 still called
traditional web which is primarily a static
web, centered on the distribution of
information. It is characterized by product-oriented
sites, which require little intervention from users [1].
The appearance of social networks (Facebook,
Twitter, LinkedIn ...), blogs, and forums has
revolutionized the web, it's the web 0.2. Currently,
they privilege the amount of sharing (texts, videos,
Fig. 1. Internet of Things domain
images...) [1]. They sees the emergence of social
networks, smartphones and blogs. This is where we All this seems interesting for the first sight, but what
want to go, even if the web 0.3 is not completely does this revolution bring us?
defined, it would be the semantic web, which aims to
organize the mass of information available according II. INTERNET OF THINGS SECURITY
to the context and the needs of each user, taking into
A. Internet of Things security, a black past
consideration its location, preferences [1], it is the
internet of things (IoT). The security of IoT is a riddle, it gets its value
The Internet of Things represents a vision in which when it fails, it rests on 3 pillars [2] called "CIA", here
the Internet extends into the real world including are the 3 things that can be done to personal and
everyday objects. Physical elements are no longer confidential user data:
disconnected from the virtual world, but can be - Theft them (confidentiality),
controlled remotely and serve as physical access - Modify them (Integrity),
points to Internet services. - You prevent to get them (Access).
This paper is organized as follows: In the paragraphs below, we will cite some
In section II, we first approach the black past of examples of the black past in the IoT field security.
IoT, citing some outstanding examples in the world. In 2000, an Australian was imprisoned two years
Afterwards, we also dehull each IoT layer. Finally we after hacking a remote sewage treatment plant, causing
explain the security of the IoT architecture (protocols, the discharge of raw sewage into public places [22].
services, support technologies ...)