N. D. Enterprise and R. I. Micro, Nanosystems, Internet of things in 2020, roadmap for the future, 2008.

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

K. Haley, 2014 predictions from symantec, http://www.symantec.com/connect/blogs/2014- predictions-symantec-0, accessed, pp.31-34, 2013.

F. B. Abreu, A. Morais, A. Cavalli, B. Wehbi, and E. , Montes de Oca, An Effective Attack Detection Approach in Wireless Mesh Networks, 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1450-1455, 2013.
DOI : 10.1109/waina.2013.1

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless sensor network security: A survey

A. Wood and J. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002.
DOI : 10.1109/MC.2002.1039518

N. Vlajic and D. Stevanovic, Performance Analysis of ZigBee-Based Wireless Sensor Networks with Path-Constrained Mobile Sink(s), 2009 Third International Conference on Sensor Technologies and Applications, pp.61-68, 2009.
DOI : 10.1109/SENSORCOMM.2009.114

K. Zen, D. Habibi, S. Member, A. Rassau, and I. Ahmad, Performance Evaluation of IEEE 802 . 15 . 4 for Mobile Sensor Networks, Tech. rep., School of Engineering, 2008.

X. Chen, K. Makki, K. Yen, and N. Pissinou, Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, pp.52-73, 2009.
DOI : 10.1109/SURV.2009.090205

A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, A survey on jamming attacks and countermeasures in WSNs, IEEE Communications Surveys & Tutorials, vol.11, issue.4, pp.42-56, 2009.
DOI : 10.1109/SURV.2009.090404

G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Rfc 4944: Transmission of ipv6 packets over ieee 802, p.2012, 2007.

Z. Shelby, S. Chakrabarti, E. Nordmark, and C. Borman, Rfc 6775: Neighbor discovery optimization for ipv6 over low-power wireless personal area networks (6lowpans, Tech. rep., IETF, p.2012, 2012.

A. A. Hasbollah, S. H. Ariffin, and J. Bahru, Performance Analysis For 6loWPAN IEEE 802 . 15 . 4 with IPv6 Network, pp.4-8, 2009.

R. Maley, The new zigbee ip specification: Ipv6 control for low-power, low-cost devices, 2013.

T. Winter, P. Thubert, A. Brand, J. Hui, R. Kelsey et al., Rfc 6550: Rpl: Ipv6 routing protocol for low-power and lossy networks, 2008.

C. Gomez and J. Paradells, Wireless home automation networks: A survey of architectures and technologies, IEEE Communications Magazine, vol.48, issue.6, pp.92-101, 2010.
DOI : 10.1109/MCOM.2010.5473869

A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, Internet of Things for Smart Cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014.
DOI : 10.1109/JIOT.2014.2306328

A. F. Skarmeta, J. L. Hernandez-ramos, and M. V. Moreno, A decentralized approach for security and privacy challenges in the Internet of Things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.67-72, 2014.
DOI : 10.1109/WF-IoT.2014.6803122

I. Gligori, S. Dejanovi, and . Krco, Performance Evaluation of Compact Binary XML Representation for Constrained Devices, Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on, pp.1-5, 2011.

D. Caputo, L. Mainetti, L. Patrono, and A. Vilei, Implementation of the EXI Schema on Wireless Sensor Nodes Using Contiki, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.770-774, 2012.
DOI : 10.1109/IMIS.2012.79

O. Garcia-morchon, S. Kumar, R. Hummen, and R. Struik, Security Considerations in the IP-based Internet of Things draft-garcia-core-security-06, 2014.

R. Moskowitz, P. Nikander, P. Jokela, and T. Hederson, Rfc 5201: Host identity protocol, Tech. rep., IETF, accessed 23, p.2012, 2008.

P. Urien, S. Elrharbi, D. Nyamy, H. Chabanne, T. Icart et al., HIP-tags architecture implementation for the Internet of things, 2009 First Asian Himalayas International Conference on Internet, pp.1-5, 2009.
DOI : 10.1109/AHICI.2009.5340263

URL : https://hal.archives-ouvertes.fr/hal-01126195

. Hummen, . Hiller, and W. Henze, A hip dex compression layer for the ip-based internet of things, Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, pp.259-266, 2013.

D. Nyamy and P. Urien, HIP-TAG, a new paradigm for the Internet of Things, 2011 IEEE Consumer Communications and Networking Conference (CCNC), pp.49-54, 2011.
DOI : 10.1109/CCNC.2011.5766521

F. V. Meca, J. H. Ziegeldorf, P. M. Sanchez, O. G. Morchon, S. S. Kumar et al., HIP Security Architecture for the IP Based Internet of Things, 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1331-1336, 2013.

C. Hochleitner, C. Graf, D. Unger, and M. Tscheligi, Making Devices Trustworthy : Security and Trust Feedback in the Internet of Things, in: Pervasive'12 Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, 2012.

W. Leister and T. Schulz, Ideas for a Trust Indicator in the Internet of Things, pp.31-34, 2012.

D. Pietro, Security and Trust Challenges in the Area of IoT, 2012.

L. Atzori, A. Iera, and G. Morabito, From "smart objects" to "social objects": The next evolutionary step of the internet of things, IEEE Communications Magazine, vol.52, issue.1, pp.97-105, 2014.
DOI : 10.1109/MCOM.2014.6710070

M. Nitti, L. Atzori, and I. P. Cvijikj, Network navigability in the social Internet of Things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.2014-405, 2014.
DOI : 10.1109/WF-IoT.2014.6803200

M. Nitti, R. Girau, L. Atzori, and S. Member, Trustworthiness Management in the Social Internet of Things, Knowledge and Data Engineering, IEEE Transactions on, vol.26, issue.5, pp.1253-1266, 2014.

H. Nasiraee and J. B. Mohasefi, A novel three party key establishment scheme in the context of Internet-of-Things, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), pp.1-5
DOI : 10.1109/ISCISC.2013.6767322

S. Machara, S. Chabridon, and C. Taconet, Trust-Based Context Contract Models for the Internet of Things, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, pp.557-562, 2013.
DOI : 10.1109/UIC-ATC.2013.73

URL : https://hal.archives-ouvertes.fr/hal-01257890

P. N. Mahalle, P. A. Thakre, N. R. Prasad, and R. Prasad, A fuzzy approach to trust based access control in internet of things, Wireless VITAE 2013, pp.2-6, 2013.
DOI : 10.1109/VITAE.2013.6617083

L. M. Oliveira, J. J. Rodrigues, C. Neto, and A. F. De-sousa, Network Admission Control Solution for 6LoWPAN Networks, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.472-477, 2013.
DOI : 10.1109/IMIS.2013.85

Z. Shelby, K. Hartke, and C. Bormann, Constrained application protocol (coap) draft-ietf-core- coap-18, Tech. rep., IETF, accessed 23, p.2012, 2013.
DOI : 10.17487/rfc7252

URL : http://tools-jp.mtk.nao.ac.jp/pdf/draft-ietf-core-coap-03.pdf

J. Granjal, E. Monteiro, and J. S. Silva, On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications, 2012 IEEE International Conference on Green Computing and Communications, pp.87-93, 2012.
DOI : 10.1109/GreenCom.2012.23

T. Kothmayr, C. Schmitt, W. Hu, and M. Br, A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, pp.2012-956
DOI : 10.1109/LCNW.2012.6424088

A. Azzara, D. Alessandrelli, S. Bocchino, P. Pagano, and M. Petracca, Architecture, Functional Requirements, and Early Implementation of an Instrumentation Grid for the IoT, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, pp.320-327, 2012.
DOI : 10.1109/HPCC.2012.50

S. Lohr, The age of big data, New York Times the opinion pages: Sunday Review, 2012.

L. Fried, Minimizing risk is easy: Adopt a bill of rights, New York Times the opinion pages: Room for debate, 2014.

M. Bennett, The internet of things will kill privacy, Website TheInquirerDebate.net, accessed 27, 2014.

J. Sanchez-alcon, L. Lopez, J. Martinez, and P. Castillejo, Automated determination of security services to ensure personal data protection in the Internet of Things applications, Third International Conference on Innovative Computing Technology (INTECH 2013), pp.71-76, 2013.
DOI : 10.1109/INTECH.2013.6653704

O. Vermesan and P. Friess, Internet of things -Converging technologies for smart environments and integrated ecosystems, River Publishers' Series in Information Science and Technology, River Publishers, PO box 1657 Algade 43, 2013.

A. Castellani, M. Gheda, N. Bui, M. Rossi, and M. Zorzi, Web Services for the Internet of Things through CoAP and EXI, 2011 IEEE International Conference on Communications Workshops (ICC), pp.1-6, 2011.
DOI : 10.1109/iccw.2011.5963563

Y. Doi, Y. Sato, M. Ishiyama, Y. Ohba, and K. Teramoto, XML-less EXI with code generation for integration of embedded devices in web based systems, 2012 3rd IEEE International Conference on the Internet of Things, pp.76-83, 2012.
DOI : 10.1109/IOT.2012.6402307