{"id":10809,"date":"2025-02-11T14:05:28","date_gmt":"2025-02-11T13:05:28","guid":{"rendered":"https:\/\/www.telecom-sudparis.eu\/en\/?p=10809"},"modified":"2025-02-11T14:09:14","modified_gmt":"2025-02-11T13:09:14","slug":"variot-the-cybersecurity-of-connected-objects","status":"publish","type":"post","link":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/","title":{"rendered":"VARIoT, the cybersecurity of connected objects"},"content":{"rendered":"<div id=\"pl-10809\"  class=\"panel-layout\" ><div id=\"pg-10809-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-10809-0\" ><div id=\"pgc-10809-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-10809-0-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-10809-0-1-0\" class=\"so-panel widget widget_tsp-widget-content panel-first-child panel-last-child widgetopts-SO\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-tsp-widget-content so-widget-tsp-widget-content-default-58ba54af99fe-10809\"\n\t\t\t\n\t\t>    <div class=\"wrap widget-content\">\n        <div class=\"content-area\">\n            <main id=\"main\" class=\"site-main\">\n                          <div class=\"addthis_inline_share_toolbox_hibt addthis_mobile\"><\/div>\n          <div class=\"breadcrumb\">\n                      <\/div>\n                      <article id=\"post-10809\" class=\"post-10809 post type-post status-publish format-standard has-post-thumbnail hentry category-about-us category-research\">\n                    <header class=\"entry-header\">\n\n                                                <h1 class=\"entry-title\">\n\t                        VARIoT, the cybersecurity of connected objects                        <\/h1>\n                        \n\t                                                                <\/header><!-- .entry-header -->\n                                                        <div id=\"secondary\" class=\"content-area\">\n                                        <section id=\"siteorigin-panels-post-content-2\" class=\"widget widget_siteorigin-panels-post-content\"><div class=\"featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"the cybersecurity of connected objects\" \/><\/div><\/section>                                    <\/div>\n                                                    <div class=\"entry-content\">\n                      <p><strong>The development of the Internet of Things (IoT) raises the crucial question of the security of connected objects, which are particularly vulnerable to attacks. T\u00e9l\u00e9com SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project <\/strong><a href=\"https:\/\/www.variot.eu\/\"><strong>VARIoT<\/strong><\/a><strong> (Vulnerability and Attack Repository for IoT).<\/strong><strong>\u00a0 Here's a look at an ambitious and promising project.<\/strong><\/p>\n<h2>The creation of the project<\/h2>\n<p>The VARIoT project was set up by <strong>Gr\u00e9gory Blanc,<\/strong> a teacher-researcher at T\u00e9l\u00e9com SudParis, lecturer in cybersecurity and networks, coordinator of the third-year specialization in <a href=\"https:\/\/www.telecom-sudparis.eu\/formation\/securite-des-systemes-et-des-reseaux\/\">systems and network security<\/a>, and head of European and national projects.<\/p>\n<p>After completing his engineering school internship in a research laboratory in Japan, Gr\u00e9gory Blanc continued his studies with a thesis in the field of cybersecurity. <em>\u201cThe topic was related to client-side scripting, the objective being to protect the browser against attacks that can be organized via malware-infected websites,\u201d<\/em> says Gr\u00e9gory Blanc.<\/p>\n<p>Back in France, the young researcher obtained a postdoc at T\u00e9l\u00e9com SudParis, with <strong>Professor Herv\u00e9 Debar.<\/strong> In 2012, the opportunity arose to participate in a European project in collaboration with Japan.<strong> This first project paved the way for collaborations such as the VARIoT project.<\/strong> Initiated by a European call for projects from the <a href=\"https:\/\/ec.europa.eu\/inea\/en\">Innovation and Networks Executive Agency<\/a> (INEA), this project, which began in 2019 and ends in 2022, involves five European partners on the IT security of connected objects.<\/p>\n<h2>Why should we be concerned about the security of connected objects?<\/h2>\n<p>Being mass-produced and having a short time-to-market, <a href=\"https:\/\/www.telecom-sudparis.eu\/en\/actualite\/doctoral-thesis-deep-learning-for-internet-of-things-iot-network-security\/\">connected objects are subject to failures in terms of computer security<\/a>. Since their resources are limited, once the operating system and various applications are installed, they have little memory left for security software.\u00a0<strong>Security often has to be outsourced, which results in a notorious vulnerability of these objects to attacks.<\/strong><\/p>\n<p><em>\u201cFor objects connected to the Internet via a wireless connection, updates can be vulnerable to interception (or Man-in-the-Middle attacks) when integrity and authenticity guarantees are lacking: when requests and responses are not encrypted, the attacker can modify their content, especially if the object does not verify the identity of the update server,\u201d <\/em>explains Gregory Blanc.<\/p>\n<p><em><a href=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-10835\" src=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1-150x150.jpg\" alt=\"\" width=\"299\" height=\"206\" srcset=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1-24x17.jpg 24w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1-36x25.jpg 36w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1-48x33.jpg 48w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/Iot-au-coeur-des-process-m\u00e9tiers-min-1-300x207-1.jpg 300w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/><\/a>\u201cAnother very common vulnerability is <strong>the administration web portal, like the Telnet service, used as an administration interface by many objects.<\/strong>\u00a0You can connect to it using the administration credentials, which are often left as the default (e.g. admin\/admin). Mirai is known to exploit this vulnerability.<\/em><\/p>\n<p><em>The attacks work by scanning the Internet for objects responding on the Telnet port that have weak authentication, i.e. with no or insufficiently protective passwords. It is then possible to take control of the objects and install new programs or generate requests on other entities on the Internet in order to create, for example, distributed denial of service attacks (saturation of communication capacities),\u201d<\/em> says Gr\u00e9gory Blanc.<\/p>\n<h2>The basis of the project<\/h2>\n<p>The purpose of VARIoT is to make all the data in the world on the vulnerabilities of connected objects and the attacks that target them available via a set of European web portals. Implementation of the web portal is supported by <a href=\"https:\/\/www.carnot-tsn.fr\/\">Carnot T\u00e9l\u00e9com &amp; Soci\u00e9t\u00e9 num\u00e9rique<\/a>. The consortium set up to support the project is made up of T\u00e9l\u00e9com SudParis, the Polish research institute NASK, the Dutch <a href=\"https:\/\/www.shadowserver.org\/\">Shadowserver<\/a> foundation, the <a href=\"https:\/\/www.circl.lu\/\">Computer Incident Response Center<\/a>\u00a0 in Luxembourg and <a href=\"https:\/\/www.mondragon.edu\/en\/home\">Mondragon University<\/a> (Spain).<\/p>\n<p>&nbsp;<\/p>\n<p><strong>T\u00e9l\u00e9com SudParis brings its expertise in intrusion detection.<\/strong> <em>\u201cOur approach is to observe communication on the networks and try to determine whether the messages are issued by legitimate or malicious entities,\u201d <\/em>says Gr\u00e9gory Blanc.\u00a0In the VARIoT project, a number of objects have been deployed in realistic conditions, interacting with humans to generate real traffic.\u00a0<strong>This legitimate network profile is integrated into machine learning algorithms, so that an anomaly can be identified as soon as it appears.<\/strong>\u00a0This prevents connected objects that have been infected from sending messages outside the network where they are located. Signatures of previously infected objects will also be collected to provide network behavior profiles of malware. This task is being carried out by Mondragon University, which has proposed a platform to reproduce the infection of an object and capture the network traffic, once this compromised object generates messages.<\/p>\n<h2>A collaborative network<\/h2>\n<p><figure id=\"attachment_10841\" aria-describedby=\"caption-attachment-10841\" style=\"width: 305px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10841\" src=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1.jpg\" alt=\"\" width=\"305\" height=\"202\" srcset=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1.jpg 300w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1-24x16.jpg 24w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1-36x24.jpg 36w, https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/european-data-portal-300x199-1-48x32.jpg 48w\" sizes=\"auto, (max-width: 305px) 100vw, 305px\" \/><\/a><figcaption id=\"caption-attachment-10841\" class=\"wp-caption-text\">\u00a9 European Data Portal\/Facebook<\/figcaption><\/figure><\/p>\n<p>T\u00e9l\u00e9com SudParis also shares its data and IoT traffic models on the web portal (<a href=\"https:\/\/www.variot.telecom-sudparis.eu\/\">variot.telecom-sudparis.eu<\/a>).<\/p>\n<p><strong>Shadowserver scans the entire Internet regularly to identify threats and share them with its network of partners.<\/strong>\u00a0Since the beginning of the VARIoT project, Shadowserver has been scanning connected objects to identify them and study their security levels. Aggregation of data and constitution of a database is managed by NASK.<\/p>\n<p>A threat analysis on IoT objects is coordinated by <strong><em>Smile<\/em><\/strong>, an entity working under the CERT (<a href=\"https:\/\/www.ssi.gouv.fr\/agence\/cybersecurite\/ssi-en-france\/les-cert-francais\/\">Computer Emergency Response Team<\/a>) in Luxembourg, who have proposed to use an information exchange platform (MISP) between CERTs on a global level, and to share cybersecurity data sources of connected objects across Europe on the <a href=\"https:\/\/data.europa.eu\/en\">European Data Portal<\/a>.<\/p>\n<h2>The benefits<\/h2>\n<p>The project has a very concrete focus on improving IoT cybersecurity.\u00a0\u00a0<strong>By providing more detailed knowledge of vulnerabilities and threats to connected objects, it will enable the development of tools capable of anticipating and preventing the occurrence of threats.<\/strong><\/p>\n<p>Moreover, since network data on connected objects is rare and difficult to obtain (due to the protection of privacy and personal data), generating this data will provide visibility and enable the evaluation of intrusion detection tools developed at T\u00e9l\u00e9com SudParis.<\/p>\n<p>The contacts that are being established with <a href=\"https:\/\/www.ynu.ac.jp\/english\/\">Yokohama National University<\/a>\u00a0for collaboration on these topics illustrate the broad interest in this work.<\/p>\n                    <\/div><!-- .entry-content -->\n                <\/article><!-- #post-## -->\n\n            <\/main><!-- #main -->\n        <\/div><!-- #primary -->\n    <\/div><!-- .wrap -->\n\t<\/div><\/div><\/div><div id=\"pgc-10809-0-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-10809-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-10809-1\" ><div id=\"pgc-10809-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-10809-1-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-10809-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child widgetopts-SO\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-10809-1-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Contact Carnot TSN<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/www.telecom-sudparis.eu\/wp-content\/uploads\/2017\/04\/olivier-1-e1587135655594.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7167 alignleft\" src=\"https:\/\/www.telecom-sudparis.eu\/wp-content\/uploads\/2017\/04\/olivier-1-e1587135655594.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><a href=\"mailto:olivier.martinot@telecom-sudparis.eu\">Olivier Martinot<\/a><\/p>\n<p>Director of Innovation and Corporate Relations<\/p>\n<p><strong>Telecom SudParis\u00a0<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-10809-1-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-10809-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-10809-2\" ><div id=\"pgc-10809-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-10809-2-0-0\" class=\"so-panel widget widget_tsp-widget-connexe panel-first-child panel-last-child widgetopts-SO\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-tsp-widget-connexe so-widget-tsp-widget-connexe-default-58ba54af99fe-10809\"\n\t\t\t\n\t\t>        <div class=\"widget-connexe\">\n            <div class=\"wrap\">\n                                  <div class=\"post\">\n                      <a href=\"https:\/\/www.telecom-sudparis.eu\/en\/actualite\/doctoral-thesis-deep-learning-for-internet-of-things-iot-network-security\/\">\n                                                        <header class=\"entry-header\" style=\"background-image:url(https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/04\/iot-1280.jpg)\">\n                                    <span class=\"overlay\"><\/span>\n                                <\/header>\n                                                      <div class=\"entry-content\">\n                          <h3 class=\"title\">Doctoral thesis: \u00ab Deep Learning for Internet of Things (IoT) Network Security \u00bb<\/h3>\n                                                <\/div>\n\n                      <\/a>\n                  <\/div>\n                                  <div class=\"post\">\n                      <a href=\"https:\/\/www.telecom-sudparis.eu\/en\/cybersecurity\/\">\n                                                        <header class=\"entry-header\" style=\"background-image:url(https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2020\/01\/DSC04718-e1527169308556.jpg)\">\n                                    <span class=\"overlay\"><\/span>\n                                <\/header>\n                                                      <div class=\"entry-content\">\n                          <h3 class=\"title\">Cybersecurity<\/h3>\n                                                <\/div>\n\n                      <\/a>\n                  <\/div>\n                                  <div class=\"post\">\n                      <a href=\"https:\/\/www.telecom-sudparis.eu\/en\/actualite\/doctoral-thesis-machine-learning-based-localization-in-5g\/\">\n                                                        <header class=\"entry-header\" style=\"background-image:url(https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/04\/technology-4816658-400.jpg)\">\n                                    <span class=\"overlay\"><\/span>\n                                <\/header>\n                                                      <div class=\"entry-content\">\n                          <h3 class=\"title\">Doctoral thesis: \u00ab Machine Learning based localization in 5G \u00bb<\/h3>\n                                                <\/div>\n\n                      <\/a>\n                  <\/div>\n                            <\/div>\n        <\/div>\n\t    <\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)<\/p>\n","protected":false},"author":22,"featured_media":10824,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-10809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-about-us","category-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VARIoT, the cybersecurity of connected objects<\/title>\n<meta name=\"description\" content=\"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VARIoT, the cybersecurity of connected objects\" \/>\n<meta property=\"og:description\" content=\"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/\" \/>\n<meta property=\"og:site_name\" content=\"TELECOM SudParis\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T13:05:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T13:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Keita Martinez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Keita Martinez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/\"},\"author\":{\"name\":\"David Keita Martinez\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/#\\\/schema\\\/person\\\/72e1edb43f4fa718d1da5f94c5568852\"},\"headline\":\"VARIoT, the cybersecurity of connected objects\",\"datePublished\":\"2025-02-11T13:05:28+00:00\",\"dateModified\":\"2025-02-11T13:09:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/\"},\"wordCount\":37,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/05\\\/variot-logo-400x400px.jpg\",\"articleSection\":[\"About us\",\"Research\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/\",\"url\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/\",\"name\":\"VARIoT, the cybersecurity of connected objects\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/05\\\/variot-logo-400x400px.jpg\",\"datePublished\":\"2025-02-11T13:05:28+00:00\",\"dateModified\":\"2025-02-11T13:09:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/#\\\/schema\\\/person\\\/72e1edb43f4fa718d1da5f94c5568852\"},\"description\":\"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/05\\\/variot-logo-400x400px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/05\\\/variot-logo-400x400px.jpg\",\"width\":400,\"height\":400,\"caption\":\"the cybersecurity of connected objects\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/about-us\\\/variot-the-cybersecurity-of-connected-objects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VARIoT, the cybersecurity of connected objects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/\",\"name\":\"TELECOM SudParis\",\"description\":\"Mastering the digital society\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/#\\\/schema\\\/person\\\/72e1edb43f4fa718d1da5f94c5568852\",\"name\":\"David Keita Martinez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g\",\"caption\":\"David Keita Martinez\"},\"url\":\"https:\\\/\\\/www.telecom-sudparis.eu\\\/en\\\/author\\\/davidk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VARIoT, the cybersecurity of connected objects","description":"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/","og_locale":"en_GB","og_type":"article","og_title":"VARIoT, the cybersecurity of connected objects","og_description":"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)","og_url":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/","og_site_name":"TELECOM SudParis","article_published_time":"2025-02-11T13:05:28+00:00","article_modified_time":"2025-02-11T13:09:14+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg","type":"image\/jpeg"}],"author":"David Keita Martinez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Keita Martinez","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#article","isPartOf":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/"},"author":{"name":"David Keita Martinez","@id":"https:\/\/www.telecom-sudparis.eu\/en\/#\/schema\/person\/72e1edb43f4fa718d1da5f94c5568852"},"headline":"VARIoT, the cybersecurity of connected objects","datePublished":"2025-02-11T13:05:28+00:00","dateModified":"2025-02-11T13:09:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/"},"wordCount":37,"commentCount":0,"image":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg","articleSection":["About us","Research"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/","url":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/","name":"VARIoT, the cybersecurity of connected objects","isPartOf":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#primaryimage"},"image":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg","datePublished":"2025-02-11T13:05:28+00:00","dateModified":"2025-02-11T13:09:14+00:00","author":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/#\/schema\/person\/72e1edb43f4fa718d1da5f94c5568852"},"description":"The development of the Internet of Things (IoT) raises the crucial question of the cybersecurity of connected objects, which are particularly vulnerable to attacks. Telecom SudParis is involved in the research and development of cybersecurity technologies and is particularly interested in IoT security through the European collaborative research project VARIoT (Vulnerability and Attack Repository for IoT)","breadcrumb":{"@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#primaryimage","url":"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg","contentUrl":"https:\/\/www.telecom-sudparis.eu\/en\/wp-content\/uploads\/sites\/3\/2021\/05\/variot-logo-400x400px.jpg","width":400,"height":400,"caption":"the cybersecurity of connected objects"},{"@type":"BreadcrumbList","@id":"https:\/\/www.telecom-sudparis.eu\/en\/about-us\/variot-the-cybersecurity-of-connected-objects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.telecom-sudparis.eu\/en\/"},{"@type":"ListItem","position":2,"name":"VARIoT, the cybersecurity of connected objects"}]},{"@type":"WebSite","@id":"https:\/\/www.telecom-sudparis.eu\/en\/#website","url":"https:\/\/www.telecom-sudparis.eu\/en\/","name":"TELECOM SudParis","description":"Mastering the digital society","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.telecom-sudparis.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.telecom-sudparis.eu\/en\/#\/schema\/person\/72e1edb43f4fa718d1da5f94c5568852","name":"David Keita Martinez","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8f49289ab0d710302fec1d5e9c4b29b6323fc2e08fd73e8512cc55ed0c034bc?s=96&d=mm&r=g","caption":"David Keita Martinez"},"url":"https:\/\/www.telecom-sudparis.eu\/en\/author\/davidk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/posts\/10809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/comments?post=10809"}],"version-history":[{"count":6,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/posts\/10809\/revisions"}],"predecessor-version":[{"id":13530,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/posts\/10809\/revisions\/13530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/media\/10824"}],"wp:attachment":[{"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/media?parent=10809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/categories?post=10809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.telecom-sudparis.eu\/en\/wp-json\/wp\/v2\/tags?post=10809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}