10Adapting the Security Level of IoT Applications

Tidiane SYLLA1, Mohamed-Aymen CHALOUF2 and Francine KRIEF3

1 ISA, USTTB, Bamako, Mali

2 IRISA, University of Rennes 1, Lannion, France

3 LaBRI, Bordeaux INP, Talence, France

10.1. Introduction

The Internet of Things (IoT) refers to the several billion physical devices that are connected to the Internet and able to collect and share data on the real world. These data are processed later to help make decisions. The devices are for the most part formed of objects from daily life (locks, refrigerators, glucometers, etc.). The IoT has been made possible thanks to several factors such as access to low-cost sensor technologies, ubiquitous wireless connectivity (WiFi, 4G/5G, LoRa, etc.), the availability of Cloud/Fog/Edge Computing platforms and artificial intelligence. The number of new connected objects is ever increasing to create new intelligent and evolved services for humans. Thus, the IoT contributes to making users’ daily life comfortable and to improving commercial and industrial processes, etc.

Despite the enthusiasm created by the IoT, its adoption is not total. This is due essentially to problems relating to application security, devices and protection of user privacy. Indeed, many attacks have succeeded in compromising the privacy and security of devices and applications. The low capacity of devices and the dynamic nature of the IoT make implementation of classical security and privacy protection solutions poorly adapted. ...

Get Intelligent Security Management and Control in the IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.