You are on page 1of 1

The Internet of Things (IoT) is a paradigm present in daily life

of every human being. Indeed, the IoT today includes a very wide diversity of objects integrating

sensors, actuators and also communication modules allowing them

to integrate with the Internet. These devices observe and act on the state of the real world
constituting

thus a bridge between real life and the digital world.

IoT provides many advanced services like real-time automatic monitoring

industrial, medical, agricultural, and other environments that can be covered and managed
automatically.

Assistance for the Autonomy of People at Home (AAD or AAL) is one of the

many areas benefiting from the advances made possible by the IoT. The AAD aims to help people

elderly, sick or dependent in their daily routines by providing new services

assistance in intelligent homes (“smart home”) in order to continuously monitor

their physiological constants at a lower cost to detect possible degradations of their

health. However, despite all the benefits that IoT brings to everyday life,

these dependent people, security issues considerably slow down the deployment

of these technologies. Indeed, to enable wider adoption of AAD solutions

relying on IoT, the security of the objects and networks used must be reinforced. So

new lightweight and robust mechanisms must be developed to counter threats and

attacks to which IoT infrastructures are exposed. A first line of defense is

to use authentication mechanisms adapted to the capabilities and constraints of the objects

and communication technologies in order to provide object authentication services and

to implement secure channels allowing data protection.

In this thesis, our objective is to propose security solutions for IoT in the

medical setting. To do this, we first provide a state of the art of IoT. Then, we present

security challenges facing IoT. We then consider the authentication protocols

intended to guarantee the security and respect for the privacy of users of the objects

connected. Thus, our first contribution consists of the proposal of three new protections

You might also like