H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelfflé, Vision and Challenges for Realising the Internet of Things, CERP- IoT -Cluster of European Research Projects on the Internet of Things, 2010.

L. Kiely and T. Benzel, Systemic Security Management, Institute for Critical Information Infrastructure Protection (ICIIP), 2008.
DOI : 10.1109/MSP.2006.167

A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, A Systemic Approach for IoT Security, 2013 IEEE International Conference on Distributed Computing in Sensor Systems, p.351, 2013.
DOI : 10.1109/DCOSS.2013.78

URL : https://hal.archives-ouvertes.fr/hal-00868362

R. Roman, P. Najera, and J. Lopez, Securing the Internet of Things, Computer, vol.44, issue.9, pp.51-58, 2011.
DOI : 10.1109/MC.2011.291

C. C. Aggarwal and P. S. Yu, Privacy-preserving data mining: models and algorithms, 2008.

M. Funk, Model-driven Design of Self-observing Products, pp.978-90, 2011.

P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things, Journal of Cyber Security and Mobility, vol.1, pp.309-348, 2013.

C. Liu, J. Yang, and Y. Zhang, Research on immunity-based intrusion detection technology for the Internet of Things, 2011 Seventh International Conference on Natural Computation, 2011.
DOI : 10.1109/ICNC.2011.6022060

R. Acharya and K. Asha, Data integrity and intrusion detection in Wireless Sensor Networks, 2008 16th IEEE International Conference on Networks, 2008.
DOI : 10.1109/ICON.2008.4772642

D. Chen and G. Chang, A Survey on Security Issues of M2M Communications in Cyber-Physical Systems, KSII Transactions on Internet and Information Systems, vol.6, issue.1, 2012.
DOI : 10.3837/tiis.2012.01.002

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

D. Mcknight and N. Chervany, The Meanings of Trust, 1996.

S. Etalle, J. I. Hartog, and S. Marsh, Trust and Punishment, Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems, 2007.
DOI : 10.4108/ICST.AUTONOMICS2007.2107

A. Ieee, Standard Glossary of Software Engineering Terminology, 1991.