D. Airehrour, J. Gutierrez, R. , and S. K. , Secure routing for internet of things: A survey, Journal of Network and Computer Applications, vol.66, pp.198-213, 2016.
DOI : 10.1016/j.jnca.2016.03.006

N. Dhanjani, Abusing the Internet of Things: Blackouts , Freakouts, and Stakeouts. O'Reilly Media, p.2015

B. Fouladi and S. Ghanoun, Security evaluation of the Z-Wave wireless protocol, Black Hat USA Conference, vol.24, 2013.

. Bee, https://trends.google.com/trends/explore?q= %2Fm%2F07xy17, pp.2-2

J. Granjal, E. Monteiro, and J. S. Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015.
DOI : 10.1109/COMST.2015.2388550

M. Guri, M. Monitz, Y. Mirski, Y. Elovici, and . Bitwhisper, Covert signaling channel between airgapped computers using thermal manipulations, Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium CSF '15, pp.276-289
DOI : 10.1109/csf.2015.26

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7243739

J. Y. Lee, W. C. Lin, and Y. H. Huang, A lightweight authentication protocol for Internet of Things, 2014 International Symposium on Next-Generation Electronics (ISNE), pp.1-2, 2014.
DOI : 10.1109/ISNE.2014.6839375

T. Oluwafemi, T. Kohno, S. Gupta, P. , and S. , Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security, Proceedings of the LASER 2013 USENIX, pp.13-24, 2013.

Y. M. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama et al., Analysing the rise of iot compromises, 9th USENIX Workshop on Offensive Technologies (WOOT 15) USENIX Association

J. Picod, A. Lebrun, and J. Demay, Bringing software defined radio to the penetration testing community, Black Hat USA Conference, 2014.

R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, Key management systems for sensor networks in the context of the Internet of Things, Computers & Electrical Engineering, vol.37, issue.2, pp.147-159, 2011.
DOI : 10.1016/j.compeleceng.2011.01.009

V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, Network-level security and privacy control for smart-home IoT devices, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015.
DOI : 10.1109/WiMOB.2015.7347956

K. Zhang, X. Liang, R. Lu, and X. Shen, Sybil Attacks and Their Defenses in the Internet of Things, IEEE Internet of Things Journal, vol.1, issue.5, pp.372-383, 2014.
DOI : 10.1109/JIOT.2014.2344013