Nanosystems, Internet of things in 2020, roadmap for the future, 2008. ,
The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
2014 predictions from symantec, http://www.symantec.com/connect/blogs/2014- predictions-symantec-0, accessed, pp.31-34, 2013. ,
Montes de Oca, An Effective Attack Detection Approach in Wireless Mesh Networks, 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1450-1455, 2013. ,
DOI : 10.1109/waina.2013.1
Wireless sensor network security: A survey ,
Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002. ,
DOI : 10.1109/MC.2002.1039518
Performance Analysis of ZigBee-Based Wireless Sensor Networks with Path-Constrained Mobile Sink(s), 2009 Third International Conference on Sensor Technologies and Applications, pp.61-68, 2009. ,
DOI : 10.1109/SENSORCOMM.2009.114
Performance Evaluation of IEEE 802 . 15 . 4 for Mobile Sensor Networks, Tech. rep., School of Engineering, 2008. ,
Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, pp.52-73, 2009. ,
DOI : 10.1109/SURV.2009.090205
A survey on jamming attacks and countermeasures in WSNs, IEEE Communications Surveys & Tutorials, vol.11, issue.4, pp.42-56, 2009. ,
DOI : 10.1109/SURV.2009.090404
Rfc 4944: Transmission of ipv6 packets over ieee 802, p.2012, 2007. ,
Rfc 6775: Neighbor discovery optimization for ipv6 over low-power wireless personal area networks (6lowpans, Tech. rep., IETF, p.2012, 2012. ,
Performance Analysis For 6loWPAN IEEE 802 . 15 . 4 with IPv6 Network, pp.4-8, 2009. ,
The new zigbee ip specification: Ipv6 control for low-power, low-cost devices, 2013. ,
Rfc 6550: Rpl: Ipv6 routing protocol for low-power and lossy networks, 2008. ,
Wireless home automation networks: A survey of architectures and technologies, IEEE Communications Magazine, vol.48, issue.6, pp.92-101, 2010. ,
DOI : 10.1109/MCOM.2010.5473869
Internet of Things for Smart Cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014. ,
DOI : 10.1109/JIOT.2014.2306328
A decentralized approach for security and privacy challenges in the Internet of Things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.67-72, 2014. ,
DOI : 10.1109/WF-IoT.2014.6803122
Performance Evaluation of Compact Binary XML Representation for Constrained Devices, Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on, pp.1-5, 2011. ,
Implementation of the EXI Schema on Wireless Sensor Nodes Using Contiki, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.770-774, 2012. ,
DOI : 10.1109/IMIS.2012.79
Security Considerations in the IP-based Internet of Things draft-garcia-core-security-06, 2014. ,
Rfc 5201: Host identity protocol, Tech. rep., IETF, accessed 23, p.2012, 2008. ,
HIP-tags architecture implementation for the Internet of things, 2009 First Asian Himalayas International Conference on Internet, pp.1-5, 2009. ,
DOI : 10.1109/AHICI.2009.5340263
URL : https://hal.archives-ouvertes.fr/hal-01126195
A hip dex compression layer for the ip-based internet of things, Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, pp.259-266, 2013. ,
HIP-TAG, a new paradigm for the Internet of Things, 2011 IEEE Consumer Communications and Networking Conference (CCNC), pp.49-54, 2011. ,
DOI : 10.1109/CCNC.2011.5766521
HIP Security Architecture for the IP Based Internet of Things, 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1331-1336, 2013. ,
Making Devices Trustworthy : Security and Trust Feedback in the Internet of Things, in: Pervasive'12 Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, 2012. ,
Ideas for a Trust Indicator in the Internet of Things, pp.31-34, 2012. ,
Security and Trust Challenges in the Area of IoT, 2012. ,
From "smart objects" to "social objects": The next evolutionary step of the internet of things, IEEE Communications Magazine, vol.52, issue.1, pp.97-105, 2014. ,
DOI : 10.1109/MCOM.2014.6710070
Network navigability in the social Internet of Things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.2014-405, 2014. ,
DOI : 10.1109/WF-IoT.2014.6803200
Trustworthiness Management in the Social Internet of Things, Knowledge and Data Engineering, IEEE Transactions on, vol.26, issue.5, pp.1253-1266, 2014. ,
A novel three party key establishment scheme in the context of Internet-of-Things, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), pp.1-5 ,
DOI : 10.1109/ISCISC.2013.6767322
Trust-Based Context Contract Models for the Internet of Things, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, pp.557-562, 2013. ,
DOI : 10.1109/UIC-ATC.2013.73
URL : https://hal.archives-ouvertes.fr/hal-01257890
A fuzzy approach to trust based access control in internet of things, Wireless VITAE 2013, pp.2-6, 2013. ,
DOI : 10.1109/VITAE.2013.6617083
Network Admission Control Solution for 6LoWPAN Networks, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.472-477, 2013. ,
DOI : 10.1109/IMIS.2013.85
Constrained application protocol (coap) draft-ietf-core- coap-18, Tech. rep., IETF, accessed 23, p.2012, 2013. ,
DOI : 10.17487/rfc7252
URL : http://tools-jp.mtk.nao.ac.jp/pdf/draft-ietf-core-coap-03.pdf
On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications, 2012 IEEE International Conference on Green Computing and Communications, pp.87-93, 2012. ,
DOI : 10.1109/GreenCom.2012.23
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, pp.2012-956 ,
DOI : 10.1109/LCNW.2012.6424088
Architecture, Functional Requirements, and Early Implementation of an Instrumentation Grid for the IoT, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, pp.320-327, 2012. ,
DOI : 10.1109/HPCC.2012.50
The age of big data, New York Times the opinion pages: Sunday Review, 2012. ,
Minimizing risk is easy: Adopt a bill of rights, New York Times the opinion pages: Room for debate, 2014. ,
The internet of things will kill privacy, Website TheInquirerDebate.net, accessed 27, 2014. ,
Automated determination of security services to ensure personal data protection in the Internet of Things applications, Third International Conference on Innovative Computing Technology (INTECH 2013), pp.71-76, 2013. ,
DOI : 10.1109/INTECH.2013.6653704
Internet of things -Converging technologies for smart environments and integrated ecosystems, River Publishers' Series in Information Science and Technology, River Publishers, PO box 1657 Algade 43, 2013. ,
Web Services for the Internet of Things through CoAP and EXI, 2011 IEEE International Conference on Communications Workshops (ICC), pp.1-6, 2011. ,
DOI : 10.1109/iccw.2011.5963563
XML-less EXI with code generation for integration of embedded devices in web based systems, 2012 3rd IEEE International Conference on the Internet of Things, pp.76-83, 2012. ,
DOI : 10.1109/IOT.2012.6402307