%0 Conference Proceedings %T Internet of Things: Security Between Challenges and Attacks %+ LIRE laboratory, Constantine %+ Université Abdelhafid Boussouf [Mila] %A Cherif, Benali %A Sahnoun, Zaidi %A Ramdane, Maamri %A Nardjes, Bouchemal %< avec comité de lecture %( Lecture Notes in Computer Science %B 2nd International Conference on Machine Learning for Networking (MLN) %C Paris, France %Y Selma Boumerdassi %Y Éric Renault %Y Paul Mühlethaler %I Springer International Publishing %3 Machine Learning for Networking %V LNCS-12081 %P 444-460 %8 2019-12-03 %D 2019 %R 10.1007/978-3-030-45778-5_31 %K IoT architectures %K Security %K Challenges %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X In recent years, the fast developments in hardware, software, networking and communication technologies have facilitated the big emergence of many technologies such as Internet of things. Measurement and collecting data from physical world, and then sending it to digital world is base of this technology. The transmitted data are stocked, processed and then possibly used to act upon the physical world. IoT adds intelligence and autonomy to many domains (e.g. health care, smart transportation and industrial monitoring). As a result, it makes human life more comfortable and simple. However, as all emerging technologies, IoT is suffering from several security challenges and issues, especially that most of IoT devices and sensors are resources- constrained devices. As security issues and attacks could put systems in dangerous and could threat human life too, this paper treats these problems. We will provide an overview about IoT technology, and we will present various security issues that target the perception and the network levels. Moreover, we will discuss how each layer is damaged by harmful and malicious purposes. Most of recent papers use the three layers architecture (which is an old architecture) to present security problems; but this paper uses one of the new reference architectures to study security threats and attacks. %G English %Z TC 6 %2 https://inria.hal.science/hal-03266469/document %2 https://inria.hal.science/hal-03266469/file/487577_1_En_31_Chapter.pdf %L hal-03266469 %U https://inria.hal.science/hal-03266469 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ FIP-LNCS-10980 %~ IFIP-LNCS-12081 %~ IFIP-MLN