V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung et al., Sizzle: A standards-based end-to-end security architecture for the embedded Internet, Pervasive and Mobile Computing, vol.1, issue.4, pp.425-445, 2005.
DOI : 10.1016/j.pmcj.2005.08.005

S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, Lithe: Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal, vol.13, issue.10, pp.3711-3720, 2013.
DOI : 10.1109/JSEN.2013.2277656

S. Raza, S. Duquennoy, T. Chung, T. Voigt, and U. Roedig, Securing communication in 6LoWPAN with compressed IPsec, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp.1-8, 2011.
DOI : 10.1109/DCOSS.2011.5982177

S. Raza, D. Trabalza, and T. Voigt, 6LoWPAN Compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp.287-289, 2012.
DOI : 10.1109/DCOSS.2012.55

Z. Shelby, K. Hartke, and C. Bormann, Constrained Application Protocol (CoAP) draft-ietf-core-coap-18, IETF work in progress, 2013.
DOI : 10.17487/rfc7252

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.467.9288

R. T. Fielding, Architectural styles and the design of network-based software architectures, pp.76-106, 2000.

V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs et al., Networking named content, Emerging networking experiments and technologies, pp.1-12, 2009.
DOI : 10.1145/1658939.1658941

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.4930

T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, K. H. Kim et al., A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.181-192, 2007.
DOI : 10.1145/1282427.1282402

D. Smetters and V. Jacobson, Securing network content, 2009.

N. Modadugu and E. Rescorla, The design and implementation of datagram TLS, Proceedings of ISOC NDSS, 2004.

I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft, SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures, Wireless Sensor Networks, pp.65-81, 2012.
DOI : 10.1016/j.comnet.2008.04.002

T. Etsi, 102 691 V1. 1.1 Machine-to-Machine communications (M2M), " Smart Metering Use Cases, 2011.

N. Tsiftes and A. Dunkels, A database in every sensor, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys '11, pp.316-332, 2011.
DOI : 10.1145/2070942.2070974

T. Jung, X. Li, and Z. Wan, Privacy preserving cloud data access with multi-authorities, 2013 Proceedings IEEE INFOCOM, 2013.
DOI : 10.1109/INFCOM.2013.6567070

S. Keoh, S. Kumar, O. Garcia-morchon, E. Dijk, and A. Rahman, DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05, IETF work in progress, 2014.

L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, A novel batch-based group key management protocol applied to the Internet of Things, Ad Hoc Networks, pp.2724-2737, 2013.
DOI : 10.1016/j.adhoc.2013.05.009

R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, Towards viable certificate-based authentication for the internet of things, Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, HotWiSec '13
DOI : 10.1145/2463183.2463193

K. Hartke, Practical Issues with Datagram Transport Layer Security in Constrained Environments draft-hartke-dice-practical-issues-00, IETF work in progress, 2013.

M. Vu?ini´vu?ini´c, B. Tourancheau, F. Rousseau, A. Duda, L. Damon et al., Energy Cost of Security in an Energy-Harvested IEEE 802.15.4 Wireless Sensor Network, 2014.

M. Luk, G. Mezzour, A. Perrig, and V. Gligor, MiniSec, Proceedings of the 6th international conference on Information processing in sensor networks , IPSN '07, p.479, 2007.
DOI : 10.1145/1236360.1236421

J. Granjal, R. Silva, E. Monteiro, J. Silva, and F. Boavida, Why is IPSec a viable option for wireless sensor networks, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp.802-807, 2008.
DOI : 10.1109/MAHSS.2008.4660130

R. Roman and J. Lopez, Integrating wireless sensor networks and the internet: a security analysis, Internet Research, vol.19, issue.2, 2009.
DOI : 10.1108/10662240910952373

J. Granjal, E. Monteiro, and J. Silva, A secure interconnection model for IPv6 enabled wireless sensor networks, 2010 IFIP Wireless Days, 2010.
DOI : 10.1109/WD.2010.5657743

S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, Secure communication for the Internet of Things-a comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks, vol.19, issue.2, 2012.
DOI : 10.1002/sec.406

J. Granjal, E. Monteiro, and J. S. Silva-greencom, On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications, 2012 IEEE International Conference on Green Computing and Communications, pp.87-93, 2012.
DOI : 10.1109/GreenCom.2012.23

S. Hong, D. Kim, M. Ha, S. Bae, S. J. Park et al., SNAIL: an IP-based wireless sensor network approach to the internet of things, IEEE Wireless Communications, vol.17, issue.6, pp.34-42, 2010.
DOI : 10.1109/MWC.2010.5675776

E. Rescorla and N. Modadugu, Datagram Transport Layer Security Version 1.2, IETF RFC, vol.4944, 2012.
DOI : 10.17487/rfc6347

M. Brachmann, S. L. Keoh, O. Morchon, and S. Kumar, End-to-End Transport Security in the IP-Based Internet of Things, 2012 21st International Conference on Computer Communications and Networks (ICCCN), 2012.
DOI : 10.1109/ICCCN.2012.6289292

T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, pp.956-963, 2012.
DOI : 10.1109/LCNW.2012.6424088

S. Cirani, G. Ferrari, and L. Veltri, Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, Algorithms, vol.6, issue.2, pp.197-226, 2013.
DOI : 10.3390/a6020197

L. Seitz, G. Selander, and C. Gehrmann, Authorization framework for the Internet-of-Things, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp.1-6, 2013.
DOI : 10.1109/WoWMoM.2013.6583465