Cyber Security and The Internet of Things Vulnerab
Cyber Security and The Internet of Things Vulnerab
Cyber Security and The Internet of Things Vulnerab
net/publication/351849644
CITATIONS READS
4 325
3 authors, including:
All content following this page was uploaded by Abderrahim Maizate on 31 May 2021.
Abstract— The Internet of Things (IoT) enables billions of The IoT presents many challenges. This article provides
embedded computing devices to connect to each other. It an overview of the main issues related to the security of IoT.
includes various kinds of devices, e.g., sensors, actuators, RFID We first recall the major vulnerabilities related to IoT. We
tags, or smartphones, which are very different in terms of size, are interested in the security of a connected object. Finally
weight, functionality and capabilities. we introduce the minimum safety requirements specific to
Their success is very noticed and the number of threats and IoT ;
attacks against IoT devices and services are on the increase as
well.
In IoT, The objects can be discovered, controlled and managed II. THE VARIOUS VULNERABILITIES RELATED TO IOT
from the Internet. This articulation, which represents a strong
point of the IoT, also inherit all the problematic of the security Vulnerabilities are weaknesses in a system or its design
already present in the Internet. The latter rests even with that allow an intruder to execute commands, access
renewed acuteness in this new environment, because of its unauthorized data, and/or conduct denial-of-service
characteristics special. It is important to analyze how attacks [3,4]. Vulnerabilities can be found in variety of areas
conventional security requirements (CIA, AAA, etc.) as well as in the IoT systems. In particular, they can be weaknesses in
those related to respect for privacy can be broken down in this
system hardware or software, weaknesses in policies and
new environment.
procedures used in the systems and weaknesses of the system
This paper is an attempt to classify different vulnerabilities, users themselves [5].
besides analyze and characterize security requirements.
Une étude réalisée par HP [6] sur les problèmes de
sécurité de l'IoT, en s'appuyant sur l'analyse de 10
Keywords— The Internet of Things (IoT),AAA,IoT security . équipements parmi les plus populaires dans les plateformes
IoT les plus répandues, montre que :
I. INTRODUCTION 90% of the devices collect at least one personal
The Internet of Things (IoT) is designed as a network of information via the equipment, the cloud, or the
highly connected devices (things). In today’s perspective, mobile application. These informations can be a user
The smart things cover our everyday friendly devices, such name, his address, his date of birth, health
as, thermostats, fridges, ovens, washing machines, and TV information, and even credit card numbers.
sets. IoT devices are increasingly deployed. Six out of 10 devices offer user interfaces. These
Several studies show that the number of connected devices all have vulnerabilities, including XSS
objects deployed on the Internet will experience a vulnerabilities and weak identifiers.
exponential growth in the coming years [1], thus leading to 70% of devices do not encrypt their outbound
an architecture of IoT complex and subject to significant communications.
traffic. From a qualitative point of view, the IoT has the
characteristics following [2]: 70% of devices associated with a cloud and a mobile
application allow an attacker to know if a user
account is valid via the enumeration of accounts.
1. IoT is an uncontrolled environment mainly because
80% of devices associated with a cloud and a mobile
of the mobility of objects and possibilities extended
application do not require a password of sufficient
to physically access them.
length and complexity, therefore there are likely to
2. Heterogeneity: an IoT environment can integrate use weak passwords.
entities of very variable origins (different platforms,
According to HP these problems are mainly related to
communication protocols, suppliers ...). Scalability
insufficient authentication or authorization, a lack of
related to the amount of objects that can be
message transfer encryption, an insecure web interface and
interconnected.
vulnerable software / firmware.
3. Limited resources in energy, computing capacity
and storage space