S. Greengard, The Internet of Things, 2001.

A. Vesola, W. Schulte, and B. Lheureux, Hype Cycle for the Internet of Things, Gartner Inc., Tech. Rep, 2001.

R. Roman, P. Najera, and J. Lopez, Securing the Internet of Things, IEEE Computer Journal, pp.51-58, 2011.
DOI : 10.1109/MC.2011.291

S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, Lithe: Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal, pp.3711-3720, 2013.
DOI : 10.1109/JSEN.2013.2277656

C. Schmitt, T. Kothmayr, and W. Hu, Two-way Authentication for the Internetof-Things, Internet of Things: Novel Advances and Envisioned Applications, pp.27-56, 2017.
DOI : 10.1007/978-3-319-53472-5_2

T. Kothmayr, W. Schmitt, C. Hu, M. Bruenig, and G. Carle, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, vol.11, issue.8, pp.2710-2723, 2002.
DOI : 10.1016/j.adhoc.2013.05.003

T. Heer, O. Garcia-morchon, R. Hummen, S. L. Keoh, S. S. Kumar et al., Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, vol.61, issue.3, pp.527-542, 2011.
DOI : 10.1007/s11277-011-0385-5

URL : http://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-heer-iot-challenges.pdf

R. Hummen, H. Shafagh, S. Raza, T. Voigt, and K. Wehrle, Delegation-based authentication and authorization for the IP-based Internet of Things, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp.1-9, 2014.
DOI : 10.1109/SAHCN.2014.6990364

URL : http://www.vs.inf.ethz.ch/publ/papers/mshafagh_secon14.pdf

R. Black, A. Donnelly, and C. Fournet, Ethernet topology discovery without network assistance, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004., pp.328-339, 2004.
DOI : 10.1109/ICNP.2004.1348122

URL : http://research.microsoft.com/en-us/um/people/fournet/papers/ethernet-topology-discovery-without-network-assistance-icnp04.pdf

E. Chin, A. P. Felt, V. Sekar, and D. Wagner, Measuring user confidence in smartphone security and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-16, 2012.
DOI : 10.1145/2335356.2335358

URL : http://nma.berkeley.edu/ark:/28722/bk0012h7b36

G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, Paranoid Android, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.347-356, 2010.
DOI : 10.1145/1920261.1920313