L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.

P. Huang, L. Xiao, S. Soltani, M. W. Mutka, and N. Xi, The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.15, pp.101-120, 2013.

T. Watteyne, A. Mehta, and K. Pister, Reliability through frequency diversity: why channel hopping makes sense, PE-WASUN, pp.116-123, 2009.

J. Li, F. R. Yu, G. Deng, C. Luo, Z. Ming et al., Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges, IEEE Communications Surveys Tutorials, vol.19, pp.1504-1526, 2017.

J. Granjal, E. Monteiro, and J. S. Silva, Security for the internet of things: A survey of existing protocols and open research issues, IEEE Communications Surveys & Tutorials, vol.17, pp.1294-1312, 2015.

A. Merlo, M. Migliardi, and L. Caviglione, A survey on energy-aware security mechanisms, Pervasive and Mobile Computing, vol.24, pp.77-90, 2015.

S. Naik and N. Shekokar, Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack, International Conference on Advanced Computing Technologies and Applications (ICACTA), vol.45, pp.370-379, 2015.

G. Mahalakshmi and P. Subathra, A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks, Journal of Emerging Technologies in Web Intelligence, vol.6, pp.106-110, 2014.

E. Gelenbe and Y. M. Kadioglu, Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation, IEEE International Conference on Communications Workshops (ICC Workshops), pp.1-6, 2018.

C. Cano, B. Bellalta, A. Sfairopoulou, and M. Oliver, Low energy operation in WSNs: A survey of preamble sampling MAC protocols, Computer Networks, vol.55, issue.15, pp.3351-3363, 2011.

A. Dunkels, The ContikiMAC Radio Duty Cycling Protocol, 2011.

K. Krentz, C. Meinel, and H. Graupner, Countering Three Denial-ofSleep Attacks on ContikiMAC, International Conference on Embedded Wireless Systems and Networks (EWSN), pp.108-119, 2017.

V. Manju and M. Sasikumar, Mitigation of Replay Attack In Wireless Sensor Network, International Journal on Information Technology, vol.5, 2014.

K. Krentz and C. Meinel, Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL), Computer Networks, vol.148, pp.60-71, 2019.

L. Gu and J. A. Stankovic, Radio-triggered wake-up for wireless sensor networks, International Journal of Time-Critical Computing Systems (Real-Time Systems), vol.29, issue.2, pp.157-182, 2005.

A. T. Capossele, V. Cervo, C. Petrioli, and D. Spenza, Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems, 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp.1-9, 2016.

M. Jo, L. Han, N. D. Tan, and H. P. In, A survey: energy exhausting attacks in MAC protocols in WBANs, Telecommunication Systems, vol.58, pp.153-164, 2015.

D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols, IEEE Transactions on Vehicular Technology, vol.58, pp.367-380, 2009.

O. Dagdeviren, R. Sokullu, and I. Korkmaz, GTS Attack : An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks, International Journal On Advances in Internet Technology, vol.2, issue.1, 2009.

Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks, EURASIP Journal on Wireless Communications and Networking, p.93830, 2006.

X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou et al., Ghostin-zigbee: Energy depletion attack on zigbee-based wireless networks, IEEE Internet of Things Journal, vol.3, pp.816-829, 2016.

W. Xu, W. Trappe, Y. Zhang, and T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.46-57, 2005.

W. Ye, J. Heidemann, and D. Estrin, An Energy-Efficient MAC Protocol for Wireless Sensor Networks, 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol.3, pp.1567-1576, 2002.

, Low-Rate Wireless Personal Area Networks (LR-WPANs), tech. rep, 2016.

P. Thubert and T. Watteyne, 6TiSCH: IPv6 over the TSCH mode of IEEE 802.15.4e, IETF working group

R. T. Hermeto, A. Gallais, and F. Theoleyre, Scheduling for IEEE802.15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks: A survey, Elsevier Computer Communications, vol.114, pp.84-105, 2017.

E. Municio, G. Daneels, M. Vucinic, S. Latre, J. Famaey et al., Simulating 6TiSCH Networks, Wiley Transactions on Emerging Telecommunications (ETT), 2018.

M. Tiloca, S. Duquennoy, and G. Dini, , 2018.