Authentication is a very important issue that is missing in
many objects. Trusted Platform Computing (TPM) implemented
in laptops is difficult to be applied because of the lack
of suitable cryptographic algorithms developed for lightweight
smart devices. Moreover, lack of authentication,
encryption or integrity on the interconnected objects raises
serious considerations. The Transport Layer Security (TLS)
protocol and the Secure Socket Layer (SSL) protocol appear to
be efficient cryptographic solutions but they cannot be easily
applied because of the resource-constraints of the smart
objects. The low processing mechanisms for data mining and
services capable for authenticity, confidentiality and privacy
of devices raise security issues and threats for revealing
sensitive information to insecure devices and storages.