A. Al-fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, pp.2347-2376, 2015.
DOI : 10.1109/COMST.2015.2444095

M. Asplund and S. Nadjm-tehrani, Attitudes and Perceptions of IoT Security in Critical Societal Services, IEEE Access, vol.4, pp.2130-2138, 2016.
DOI : 10.1109/ACCESS.2016.2560919

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

C. Baier, M. Größer, M. Leucker, B. Bollig, and F. Ciesinski, Controller Synthesis for Probabilistic Systems, Proc. of the 3rd Int. Conf. on Theoretical Computer Science, TCS, pp.493-506, 2004.

A. Bennaceur and E. Andriescu, Roberto Speicys Cardoso, and Valérie Issarny. 2015. A Unifying Perspective on Protocol Mediation: Interoperability in the Future Internet, J. of Internet Services and Applications, vol.6, issue.12, pp.1-1215, 2015.

A. Bennaceur, A. K. Bandara, M. Jackson, W. Liu, L. Montrieux et al., Requirements-driven mediation for collaborative security, Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014, pp.37-42, 2014.
DOI : 10.1145/2593929.2593938

URL : https://hal.archives-ouvertes.fr/hal-00955562

A. Bennaceur and V. Issarny, Automated Synthesis of Mediators to Support Component Interoperability, IEEE Transactions on Software Engineering, vol.41, issue.3, pp.221-240, 2015.
DOI : 10.1109/TSE.2014.2364844

URL : https://hal.archives-ouvertes.fr/hal-01076176

P. Berander and A. Andrews, Requirements Prioritization, Engineering and Managing Software Requirements, AybükeAyb¨Aybüke Aurum and Claes Wohlin, pp.69-94, 2005.
DOI : 10.1007/3-540-28244-0_4

R. Brooks, Robots Everywhere!. In Computing Research That Changed the World: Reflections and Perspectives, CRASS '09, 2009.

C. Javier, A. Gabriel, D. Moreno, and . Garlan, Reasoning about Human Participation, 2015.

L. Cavallaro, P. Sawyer, D. Sykes, N. Bencomo, and V. Issarny, Satisfying requirements for pervasive service compositions, Proceedings of the 7th Workshop on Models@run.time, MRT '12, pp.17-22, 2012.
DOI : 10.1145/2422518.2422522

URL : https://hal.archives-ouvertes.fr/hal-00733346

G. Vinton and . Cerf, Prospects for the Internet of Things, XRDS, vol.22, issue.2, pp.28-31, 2015.

H. C. Betty, R. Cheng, H. De-lemos, P. Giese, J. Inverardi et al., Software Engineering for Self-Adaptive Systems: A Research Roadmap, Softw. Eng. for Self-Adaptive Syst. [outcome of a Dagstuhl Seminar, pp.1-26, 2009.

E. M. Clarke and J. M. Wing, Formal methods: state of the art and future directions, ACM Computing Surveys, vol.28, issue.4, pp.626-643, 1996.
DOI : 10.1145/242223.242257

URL : https://hal.archives-ouvertes.fr/hal-00444076

A. Classen, Q. Boucher, and P. Heymans, A text-based approach to feature modelling: Syntax and semantics of TVL, Science of Computer Programming, vol.76, issue.12, pp.12-1130, 2011.
DOI : 10.1016/j.scico.2010.10.005

URL : https://hal.archives-ouvertes.fr/hal-00718291

A. Classen, M. Cordy, P. Schobbens, P. Heymans, A. Legay et al., Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking, IEEE Transactions on Software Engineering, vol.39, issue.8, pp.1069-1089, 2013.
DOI : 10.1109/TSE.2012.86

M. Covington and R. Carskadden, Threat implications of the Internet of Things, Cyber Conflict (CyCon), 2013 5th Intl. Conf. on, pp.1-12, 2013.

D. Nicoí-as, . Ippolito, A. Víctor, and . Braberman, Nir Piterman, and Sebastí an Uchitel. 2013. Synthesizing nonanomalous event-based controllers for liveness goals, ACM Trans. Softw. Eng. Methodol, vol.22, p.1, 2013.

R. Ehlers, Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis, Proc. of NASA Formal Methods -Third Int. Symp., NFM, pp.101-115, 2011.
DOI : 10.1145/1755952.1755968

J. Greenyer, C. Brenner, M. Cordy, P. Heymans, and E. Gressi, Incrementally synthesizing controllers from scenario-based product line specifications, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, pp.433-443, 2013.
DOI : 10.1145/2491411.2491445

C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh, Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, p.1, 2008.
DOI : 10.1109/TSE.2007.70754

H. Consortium, HyperCat -Home, 2016.

P. Inverardi and M. Tivoli, Automatic synthesis of modular connectors via composition of protocol mediation patterns, 2013 35th International Conference on Software Engineering (ICSE), pp.3-12, 2013.
DOI : 10.1109/ICSE.2013.6606546

M. Jackson and P. Zave, Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, pp.15-24, 1995.
DOI : 10.1145/225014.225016

M. Jeronimo and J. Weast, UPnP Design by Example :A Software Designer's Guide to Universal Plug and Play, 2003.

C. Kyo, . Kang, G. Sholom, . Cohen, A. James et al., Featureoriented domain analysis (FODA) feasibility study, 1990.

R. M. Karp, Reducibility among combinatorial problems, Proc. of a Symp. on the Complexity of Computer Computations, pp.85-103, 1972.

R. M. Keller, Formal verification of parallel programs, Communications of the ACM, vol.19, issue.7, pp.371-384, 1976.
DOI : 10.1145/360248.360251

E. Letier and W. Heaven, Requirements modelling by synthesis of deontic input-output automata, 2013 35th International Conference on Software Engineering (ICSE), pp.592-601, 2013.
DOI : 10.1109/ICSE.2013.6606605

L. Valerio-panzica, J. Manna, C. Greenyer, C. Ghezzi, and . Brenner, Formalizing correctness criteria of dynamic updates derived from specification changes, Proc. of the 8th Int. Symp. on Softw. Eng. for Adaptive and Self-Managing Syst., SEAMS, pp.63-72, 2013.

R. Mateescu, P. Poizat, and G. Salä-un, Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques, IEEE Transactions on Software Engineering, vol.38, issue.4, pp.755-777, 2012.
DOI : 10.1109/TSE.2011.62

URL : https://hal.archives-ouvertes.fr/inria-00341598

G. Meng, Y. Liu, J. Zhang, A. Pokluda, and R. Boutaba, Collaborative Security, ACM Computing Surveys, vol.48, issue.1, 2015.
DOI : 10.1145/2785733

S. Nejati, M. Sabetzadeh, M. Chechik, S. M. Easterbrook, and P. Zave, Matching and Merging of Variant Feature Specifications, IEEE Transactions on Software Engineering, vol.38, issue.6, pp.1355-1375, 2012.
DOI : 10.1109/TSE.2011.112

A. Pnueli, The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977.
DOI : 10.1109/SFCS.1977.32

A. Pnueli and R. Rosner, On the synthesis of a reactive module, Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '89, pp.179-190, 1989.
DOI : 10.1145/75277.75293

P. Rodrigues, J. Kramer, and E. Lupu, On re-assembling self-managed components, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.727-733, 2015.
DOI : 10.1109/INM.2015.7140362

P. Rossi, T. Van-beek, and . Walsh, Handbook of constraint programming, 2006.

M. Salehie, L. Pasquale, I. Omoronyia, R. Ali, and B. Nuseibeh, Requirementsdriven adaptive security: Protecting variable assets at runtime, Proc. of the 20th IEEE Int. Req. Eng. Conf., RE, pp.111-120, 2012.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-porisini, Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015.
DOI : 10.1016/j.comnet.2014.11.008

R. Martin and . Stytz, Considering Defense in Depth for Software Applications, IEEE Security & Privacy, vol.2, issue.1, pp.72-75, 2004.

R. Vaculín, R. Neruda, and K. P. Sycara, The process mediation framework for semantic web services, International Journal of Agent-Oriented Software Engineering, vol.3, issue.1, pp.27-58, 2009.
DOI : 10.1504/IJAOSE.2009.022945

R. Van-der-meulen and J. Rivera, Gartner Says a Typical Family Home Could Contain More Than 500 Smart Devices by 2022, p.2839717, 2014.

A. Van-lamsweerde, Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009.
DOI : 10.1145/1453101.1453133

P. Wayner, Protecting Your Home From Afar With a Robot. The New York Times, Online, issue.11, 2010.

H. Steve and . Weingart, Physical security devices for computer subsystems: A survey of attacks and defenses, Int. Workshop on Cryptographic Hardware and Embedded Syst, pp.302-317, 2000.

G. Wiederhold, Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 1992.
DOI : 10.1109/2.121508

M. Daniel, R. E. Yellin, and . Strom, Protocol Specifications and Component Adaptors, ACM Trans. on Programming Languages and System, TOPLAS, vol.19, issue.2, pp.292-333, 1997.

Y. Yu, V. N. Franqueira, R. Thein-than-tun, B. Wieringa, and . Nuseibeh, Automated analysis of security requirements through risk-based argumentation, Journal of Systems and Software, vol.106, pp.102-116, 2015.
DOI : 10.1016/j.jss.2015.04.065

E. Yuan, N. Esfahani, and S. Malek, A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, pp.4-17, 2014.
DOI : 10.1145/2555611

L. Zeng, B. Benatallah, A. H. Ngu, M. Dumas, J. Kalagnanam et al., QoS-Aware Middleware for Web Services Composition, IEEE Trans. Softw. Eng, vol.30, pp.5-311, 2004.