
Abstract The Internet of Things (IoT) paradigm is one of the most exciting innovations of recent years. However, with each connected object the number of possible attacks will increase exponentially. This article presents a comparative study between the different solutions against Iot attacks, we will first present a security architecture that can be divided into 3 main layers: perception layer, network layer, and application layer. Each layer is divided by hierarchies that allow us to guarantee security, i.e. confidentiality, integrity, authenticity, and data acquisition. We then focused on the attacks of the perception layer which is extremely vulnerable to security attacks while classifying these attacks according to the two wireless technologies (WSN, RFID). Finally, we discuss the different approaches provided against these attacks.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 21 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
