Internet of things security

The consequences of security problems are increasingly serious. These problems can now lead to personal injury, prolonged downtime and irreparable damage to capital goods. To achieve this, systems require end-to-end security solutions that cover the layers of connectivity, furthermore, guarantee the privatization and protection of data circulated via networks. In this paper, we will give a definition to the Internet of things, try to dissect its architecture (protocols, layers, entities …), thus giving a state of the art of security in the field of internet of things (Faults detected in each layer …), finally, mention the solutions proposed until now to help researchers start their researches on internet of things security subject.

[1]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[2]  A. Laurie RFID: Practical attacks against RFID , 2007 .

[3]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[4]  Antonio F. Gómez-Skarmeta,et al.  HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management , 2009, 2009 International Conference on Computational Science and Engineering.

[5]  Yu Teng-wei Design of security and defense system for home based on Internet of things , 2010 .

[6]  Florian Michahelles,et al.  Architecting the Internet of Things , 2011 .

[7]  Ying Zhang,et al.  Technology framework of the Internet of Things and its application , 2011, 2011 International Conference on Electrical and Control Engineering.

[8]  Brent Kesler,et al.  The Vulnerability of Nuclear Facilities to Cyber Attack; Strategic Insights: Spring 2010 , 2011 .

[9]  Gao Hong-b Study of the application for the security state assessment about the internet of things based on grey correlation algorithm , 2012 .

[10]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[11]  Mohammad Ali Nematbakhsh,et al.  EVOLUTION OF THE WORLD WIDE WEB : FROM WEB 1.0 TO WEB 4.0 , 2012 .

[12]  Zhihua Li,et al.  A Multi-layer Security Model for Internet of Things , 2012 .

[13]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[14]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[15]  Weizhe Zhang,et al.  Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .

[16]  Erik Poll,et al.  Using Trusted Execution Environments in Two-factor Authentication: comparing approaches , 2013, Open Identity Summit.

[17]  Raj Kulkarni,et al.  Internet of Things: Architecture and Security , 2014 .

[18]  Nabil Kannouf,et al.  Security on RFID technology , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[19]  T. Sudhir,et al.  Spoofing Attack Detection Wireless Networks using Advanced KNN , 2016 .