Security aspects about Internet of Things networks, devices and communication protocols
IVAN VACCARI
2021
Nowadays, the Internet of Things (IoT) is a consolidated paradigm increasingly present in our lives, from simple devices to more complex systems, such as health sensor or vehicular networks. Today, there are 20 billions on IoT devices connected in the world and the number will exponentially increase in the next years cite{hung2017leading}. From a practical point of view, the Internet of Things incorporates processing skills (also called "intelligence") and connection in the most varied devices.
more »
... This involves the possibility of collecting data through these objects and analyzing them, greater automation and remote control, an analysis on how to improve the use and prevent malfunctions of the objects themselves, thus increasing the quality of their use over time. Among the many definitions on IoT, ENISA cite{enisa2017baseline} considers the IoT a "cyber-physical ecosystem of interconnected sensors and actuators, which allow intelligent decision-making". In summary, we could say, to extrapolate the concept, that we are dealing with objects (things) connected through a planetary communication network (Internet), capable of detecting, processing and transmitting information. In practice, the "thing" is in fact a computer, more or less powerful in relation to the functions for which it was designed: to detect the consumption of electricity, to allow the increasingly pushed automation governed by the control units of our cars, to automate our homes with home automation solutions, to digitize industrial plants or medical systems, to name just a few classes of IoT systems. The spread of the IoT and the birth of new application areas will draw significant advantages from the developments expected in the coming years on some enabling technologies, including the implementation of 5G/6G networks, which will lead to a significant increase in transmission speed and a contextual reduction of latency times in the use of devices, and the application of Artificial Intelligence (AI) and Machine Learning (ML) technologies, to exploit [...]
doi:10.15167/vaccari-ivan_phd2021-05-24
fatcat:eiav34rhlnfjfc4dvujmlno54u