, Up 31 Percent From, Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, 2016.

, 2018 reform of EU data protection rules

, Buy the Philips Hue White Single bulb E26 046677530341 Single bulb E26

, Echo Spot | Alexa-enabled Speaker with 2.5" ScreenBlack

, Google Home

&. Gateway and T. ,

, Remote control TRÅDFRI -IKEA

, LG Nexus 5 -Full phone specifications

, Buy the Philips Hue Bridge 046677458478 Bridge

, Raspberry Pi 3 Model B

, Amazon Alexa -Applications sur Google Play

, all 4 hue -Applications sur Google Play

, Google Home -Applications sur Google Play

, Chrome : rapide et sécurisé -Applications sur Google Play

, Philips Hue -Applications sur Google Play

, Hue Hello (For Philips Hue Lights) -Applications sur Google Play

, IFTTT -Applications sur Google Play, openHAB -Applications sur Google Play, vol.18

, Python Data Analysis Library -pandas: Python Data Analysis Library

, Burp Suite Scanner | PortSwigger

P. Cipolloni, Universal Android SSL Pinning bypass with Frida | @Mediaservice.net Technical Blog

, Exodus Privacy

L. H. Newman, How To Tighten Your Amazon Echo and Google Home Privacy, 2019.

, Snips -Using Voice to Make Technology Disappear

S. Siby, R. R. Maiti, and N. Tippenhauer, IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods, 2017.

M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. R. Sadeghi et al., IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp.2177-2184, 2017.

, Fast Web-based Attacks to Discover and Control IoT Devices

, Security Analysis for IoT devices | Completely Automated

N. Apthorpe, D. Reisman, and N. Feamster, A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic, 2017.

D. Wood, N. Apthorpe, and N. Feamster, Cleartext Data Transmissions in Consumer IoT Medical Devices, Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp.7-12, 2017.

N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster, Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping, 2018.

N. Apthorpe, D. Reisman, and N. Feamster, Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers, 2017.

W. Zhang, Y. Meng, Y. Liu, X. Zhang, Y. Zhang et al., HoMonit: Monitoring Smart Home Apps from Encrypted Traffic, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '18, pp.1074-1088, 2018.

M. Vanhoef and F. Piessens, Key reinstallation attacks: Forcing nonce reuse in WPA2, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1313-1328, 2017.

M. Ryan, Bluetooth: With Low Energy Comes Low Security, WOOT, vol.13, pp.4-4, 2013.

X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou et al., Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks, IEEE Internet of Things Journal, vol.3, issue.5, pp.816-829, 2016.

, PiRogue is a small device meant to ease network interception and analysis.: PiRanhaLysis/PiRogue, 2019.

, Pi-hole®: A black hole for Internet advertisements