Connected Objects in Information Systems

  • Onyonkiton Théophile AballoEmail author
  • Roland DéguénonvoEmail author
  • Antoine VianouEmail author
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 7)


The Internet of Things connects technical systems and sometimes also mechanical parts, electronic or even raw materials, with the web, via standardized communication interfaces. This opens up the ability to monitor and control devices and feeds for authorized users, as well as providing access to malicious people. Connected objects are also increasingly used for industrial applications. We are now talking about Industry with connected and intelligent factories to gain competitiveness. But these devices present intrinsic vulnerabilities and risks related to the new uses made possible thanks to an almost continuous connectivity to the Internet. There are actually very few areas of empirical testing currently. While waiting for a greater technological maturity of the Internet of Things, using supervision provides complete visibility of the entire network, which can greatly contribute to its security. The purpose of this article is to study objects connected to information systems....


Flow Internet of Things Risks Vulnerabilities 


  1. 1.
    Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., Yegin, A.: Protocol for Carrying Authentication for Network Access (PANA), RFC 5191, IETF, May 2008Google Scholar
  2. 2.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), RFC 3748, IETF, June 2004Google Scholar
  3. 3.
    Pack, S., Choi, Y.: Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1 x Model. Springer (2003)Google Scholar
  4. 4.
    Yeong, W., Howes, T., Kille, S.: Lightweight Directory Access Protocol, RFC 1777, IETF, March 1995Google Scholar
  5. 5.
    Sun, S., Reilly, S., Lannom, L., Petrone, J.: Handle System Protocol (ver 2.1) Specification, RFC 3652, November 2003Google Scholar
  6. 6.
    Hernández-Ramos, J.L., Jara, A.J., Marín, L.: DCapBAC: embedding authorization logic into smart things through ECC optimizations, Int. J. Comput. Math. (2016)Google Scholar
  7. 7.
    Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP), RFC 7252, IETF, June 2014Google Scholar
  8. 8.
    Internet of things research study 2015 report, Hewlett Packard (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Doctoral School of Engineering SciencesAbomey-CalaviBenin
  2. 2.Abomey-Calavi University, LETIA-UACCotonouBenin

Personalised recommendations