A. Al-fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015.

L. D. Xu, W. He, and S. Li, Internet of things in industries: A survey, IEEE Transactions on industrial informatics, vol.10, issue.4, pp.2233-2243, 2014.

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Comp. Syst, vol.29, issue.7, pp.1645-1660, 2013.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-porisini, Security, privacy and trust in internet of things: The road ahead, vol.76, pp.146-164, 2015.

. Gartner, Gartner says 5.8 billion enterprise and automotive iot endpoints will be in use in 2020, 2019.

J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang et al., A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, IEEE Internet of Things Journal, vol.4, issue.5, pp.1125-1142, 2017.

M. J. Kaur and P. Maheshwari, Building smart cities applications using iot and cloud-based architectures, International Conference on Industrial Informatics and Computer Systems (CIICS), pp.1-5, 2016.

T. H. News, How drones can find and hack internet-of-things devices from the sky, 2019.

T. H. News, Z-wave downgrade attack left over 100 million iot devices open to hackers, 2019.

T. H. News, Blueborne: Critical bluetooth attack puts billions of devices at risk of hacking, 2019.

T. H. News, Hackers could turn LG smart appliances into remote-controlled spy robot, 2019.

R. Hallman, J. Bryan, G. Palavicini, J. Divita, and J. Romero-mariona, IoDDoSthe internet of distributed denial of sevice attacks -A case study of the mirai malware and iot-based botnets, 2017.

J. Radcliffe, Hacking medical devices for fun and insulin: Breaking the human SCADA system, 2011.

T. H. News, Hackers can remotely access syringe infusion pumps to deliver fatal overdoses, 2019.

T. H. News, Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer, 2019.

T. H. News, How to Hack Smart Bluetooth Locks and IoT Devices -Check this Out, 2019.

B. Fouladi and S. Ghanoun, Security evaluation of the z-wave wireless protocol, Black hat USA, vol.24, 2013.

M. Ryan, Bluetooth: With low energy comes low security, 7th USENIX Workshop on Offensive Technologies, WOOT, USENIX Association, 2013.

S. Raza, A. Slabbert, T. Voigt, and K. Landernäs, Security considerations for the WirelessHART protocol, International Conference on Emerging Technologies and Factory Automation (ETFA), pp.1-8, 2009.

P. Baronti, P. Pillai, V. W. Chook, S. Chessa, A. Gotta et al., Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards, Computer Communications, vol.30, issue.7, pp.1655-1695, 2007.

M. Sain, Y. J. Kang, and H. J. Lee, Survey on security in internet of things: state of the art and challenges, International Conference on Advanced Communication Technology (ICACT), pp.699-704, 2017.

K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the internet of things, Ad Hoc Networks, vol.32, pp.17-31, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01272046

A. Reziouk, E. Laurent, and J. Demay, Practical security overview of IEEE, International Conference on Engineering & MIS (ICEMIS), pp.1-9, 2016.

M. Brachmann, O. Garcia-morchon, and M. Kirsche, Security for practical CoAP applications: Issues and solution approaches, 10th GI/ITG KuVS Fachgespraech Sensornetze, pp.15-16, 2011.

V. Karagiannis, P. Chatzimisios, F. Vazquez-gallego, and J. Alonso-zarate, A survey on application layer protocols for the internet of things, vol.3, pp.11-17, 2015.

K. Lounis and M. Zulkernine, Attacks and defenses in short-range wireless technologies for iot, IEEE Access, vol.8, pp.88892-88932, 2020.

D. M. Mendez, I. Papapanagiotou, and B. Yang, Internet of things: Survey on security and privacy, 2017.

A. Oracevic, S. Dilek, and S. Özdemir, 2017 International Symposium on Networks, Computers and Communications, pp.1-6, 2017.

F. A. Alaba, M. Othman, I. A. Hashem, and F. Alotaibi, Internet of things security: A survey, J. Network and Computer Applications, vol.88, pp.10-28, 2017.

M. Ammar, G. Russello, and B. Crispo, Internet of things: A survey on the security of iot frameworks, J. Inf. Sec. Appl, vol.38, pp.8-27, 2018.

K. Zhao and L. Ge, A survey on the internet of things security, International Conference on Computational Intelligence and Security (CIS), pp.663-667, 2013.

G. Bora, S. Bora, S. Singh, and S. M. Arsalan, Osi reference model: An overview, International Journal of Computer Trends and Technology (IJCTT), vol.7, issue.4, pp.214-218, 2014.

B. A. Forouzan, TCP/IP protocol suite, 2002.

R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, and A. Ghosh, Nb-iot system for m2m communication, wireless communications and networking conference (WCNC), pp.1-5, 2016.

, IEEE Standards Association, 802.15.4-2015 -IEEE Standard for Low-Rate Wireless Networks

J. Hui, D. Culler, and S. Chakrabarti, 6LoWPAN: Incorporating IEEE 802.15. 4 into the IP architecture, 2009.

J. Olsson, , 2014.

J. Hui and P. Thubert, Compression format for ipv6 datagrams over ieee 802.15.4-based networks, 2011.

G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of ipv6 packets over ieee 802.15.4 networks, 2007.

A. Ayadi, P. Maillé, D. Ros, L. Toutain, and T. Zheng, Implementation and evaluation of a TCP header compression for 6lowpan, International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1359-1364, 2011.
URL : https://hal.archives-ouvertes.fr/hal-02301807

Z. Shelby, K. Hartke, and C. Bormann, The constrained application protocol (coap), 2014.

R. A. Rahman and B. Shah, Security analysis of IoT protocols: A focus in CoAP, International Conference on Big Data and Smart City (ICBDSC), pp.1-7, 2016.

C. Bormann, A. P. Castellani, and Z. Shelby, CoAP: An application protocol for billions of tiny internet nodes, IEEE Internet Computing, vol.16, issue.2, pp.62-67, 2012.

N. Modadugu and E. Rescorla, The design and implementation of datagram TLS, Network and Distributed System Security Symposium (NDSS), 2004.

T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, DTLS based security and two-way authentication for the internet of things, Ad Hoc Networks, vol.11, issue.8, pp.2710-2723, 2013.

S. Raza, D. Trabalza, and T. Voigt, 6lowpan compressed DTLS for CoAP, in: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp.287-289, 2012.

A. Banks and R. Gupta, MQTT version 3.1.1, OASIS Standard, 2014.

A. Ludovici, A. Calveras, and J. Casademont, Forwarding techniques for IP fragmented packets in a real 6lowpan network, Sensors, vol.11, issue.1, pp.992-1008, 2011.

A. H. Chowdhury, M. Ikram, H. Cha, H. Redwan, S. Shams et al., Route-over vs mesh-under routing in 6lowpan, International conference on wireless communications and mobile computing: Connecting the world wirelessly, pp.1208-1212, 2009.

C. Perkins, E. Belding-royer, and S. Das, Ad hoc on-demand distance vector (AODV) routing, RFC 3561, 2003.

S. D. Park, Internet-Draft draft-daniel-6lowpan-load-adhoc-routing-03, IETF Secretariat, 6LoWPAN ad hoc on-demand distance vector routing (LOAD), 2007.

T. H. Clausen, J. Yi, and A. C. De-verdiere, Vehicular Technology Conference (VTC), pp.1-5, 2012.

O. Iova, G. P. Picco, T. Istomin, and C. Király, RPL: the routing standard for the internet of things... or is it?, IEEE Communications Magazine, vol.54, pp.16-22, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01647152

T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey et al., Rpl: Ipv6 routing protocol for low-power and lossy networks, 2012.

J. Vasseur, N. Agarwal, J. Hui, Z. Shelby, P. Bertrand et al., RPL: The IP routing protocol designed for low power and lossy networks, Internet Protocol for Smart Objects Alliance, 2011.

S. Raza, S. Duquennoy, T. Voigt, and U. Roedig, Demo abstract: Securing communication in 6lowpan with compressed ipsec, International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp.1-2, 2011.

S. Raza, T. Voigt, and V. Jutvik, Lightweight ikev2: a key management solution for both the compressed ipsec and the ieee 802.15. 4 security, Proceedings of the IETF workshop on smart object security, vol.23, 2012.

B. Sig, , 2019.

C. Gomez, J. Oller, and J. Paradells, Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology, Sensors, vol.12, issue.9, pp.11734-11753, 2012.

B. Sig, Bluetooth specification version 5, 2019.

B. S. ,

M. W. Group, Bluetooth Mesh Networking specification

S. M. Darroudi and C. Gomez, Bluetooth low energy mesh networks: A survey, Sensors, vol.17, issue.7, p.1467, 2017.

C. W. Badenhop, S. R. Graham, B. W. Ramsey, B. E. Mullins, and L. O. , Mailloux, The Z-Wave routing protocol and its security implications, Computers & Security, vol.68, pp.112-129, 2017.

C. W. Badenhop, J. D. Fuller, J. Hall, B. W. Ramsey, M. Rice et al., 9959 based wireless systems used in critical infrastructure assets, 9th International Conference Critical Infrastructure Protection (ICCIP), pp.209-227, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01431003

D. Chen, M. Nixon, and A. Mok, WirelessHART: Real-Time Mesh Network for Industrial Automation, 2010.

J. Song, S. Han, A. Mok, D. Chen, M. Lucas et al., Wirelesshart: Applying wireless technology in real-time industrial process control, Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.377-386, 2008.

K. Dang, J. Shen, L. Dong, and Y. Xia, A graph route-based superframe scheduling scheme in wirelesshart mesh networks for high robustness, Wireless Personal Communications, vol.71, issue.4, pp.2431-2444, 2013.

N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, LoRaWAN Specification, 2015.

, Objets connectés : polémique sur la sécurité du réseau français Sigfox, 2019.

S. Andy, B. Rahardjo, and B. Hanindhito, Attack scenarios and security analysis of MQTT communication protocol in IoT system, International Conference on Electrical Engineering, pp.1-6, 2017.

J. Slawomir, Gattacking bluetooth smart devices, 2016.

W. K. Zegeye, Exploiting bluetooth low energy pairing vulnerability in telemedicine, International Telemetering Conference Proceedings, International Foundation for Telemetering, 2015.

X. Fan, F. Susan, W. Long, and S. Li, Security analysis of zigbee, 2017.

X. Yang, Lorawan: Vulnerability analysis and practical exploitation, 2017.

X. Yang, E. Karampatzakis, C. Doerr, and F. Kuipers, International Conference on Internet-of-Things Design and Implementation (IoTDI), pp.129-140, 2018.

A. Reziouk, A. Lebrun, and J. Demay, Auditing 6lowpan networks using standard penetration testing tools, DEF CON, vol.24, 2016.

T. Melamed, An active man-in-the-middle attack on bluetooth smart devices, International Journal of Safety and Security Engineering, vol.8, issue.2, pp.200-211, 2018.

O. Olawumi, K. Haataja, M. Asikainen, N. Vidgren, and P. Toivanen, Three practical attacks against zigbee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned, International Conference on Hybrid Intelligent Systems (HIS), pp.199-206, 2014.

J. Durech and M. Franekova, Security attacks to ZigBee technology and their practical realization, International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp.345-349, 2014.

J. D. Fuller and B. W. Ramsey, Rogue z-wave controllers: A persistent attack channel, Local Computer Networks Conference Workshops (LCN), pp.734-741, 2015.

P. Pongle and G. Chavan, A survey: Attacks on RPL and 6LoWPAN in IoT, International Conference on Pervasive Computing (ICPC), pp.1-6, 2015.

L. Wallgren, S. Raza, and T. Voigt, Routing attacks and countermeasures in the RPLbased internet of things, International Journal of Distributed Sensor Networks (IJDSN), p.9, 2013.

G. Lee, J. Lim, D. Kim, S. Yang, and M. Yoon, An approach to mitigating sybil attack in wireless networks using zigBee, International Conference on Advanced Communication Technology (ICACT), vol.2, pp.1005-1009, 2008.

M. Mavani and K. Asawa, Modeling and analyses of ip spoofing attack in 6lowpan network, Computers & Security, vol.70, pp.95-110, 2017.

P. Perazzo, C. Vallati, D. Varano, G. Anastasi, and G. Dini, Implementation of a wormhole attack against a RPL network: Challenges and effects, 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp.95-102, 2018.

E. Aras, G. S. Ramachandran, P. Lawrence, and D. Hughes, Exploring the security vulnerabilities of LoRa, International Conference on Cybernetics (CYB-CONF), pp.1-6, 2017.

C. P. O'flynn, Message denial and alteration on IEEE 802.15. 4 low-power radio networks, International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2011.

B. Stelte and G. D. Rodosek, Thwarting attacks on ZigBee-Removal of the Killer-Bee stinger, International Conference on Network and Service Management (CNSM), pp.219-226, 2013.

M. Kurniawan and S. Yazid, Mitigation strategy of sinkhole attack in Wireless Sensor Network, International Workshop on Big Data and Information Security (IWBIS), pp.119-125, 2017.

L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, and L. Romano, My smart home is under attack, International Conference on Computational Science and Engineering (CSE), pp.145-151, 2015.

L. N. Whitehurst, T. R. Andel, and J. T. Mcdonald, Exploring security in zigbee networks, Cyber and Information Security Research Conference (CISR), pp.25-28, 2014.

D. , BtleJuice: the Bluetooth Smart MitM Framework, DEF CON 24 Internet of Things Village, 2016.

C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram et al., Analysis of a denial of service attack on tcp, IEEE Symposium on Security and Privacy, pp.208-223, 1997.

S. Sicari, A. Rizzardi, D. Miorandi, and A. Coen-porisini, Reato: Reacting to denial of service attacks in the internet of things, Computer Networks, vol.137, pp.37-48, 2018.

L. Bayou, D. Espes, N. Cuppens-boulahia, and F. Cuppens, Security issue of wirelesshart based SCADA systems, International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.225-241, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01387616

J. R. Douceur, The sybil attack, International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002.

F. Medjek, D. Tandjaoui, I. Romdhani, and N. Djedjig, Performance evaluation of RPL protocol under mobile sybil attacks, pp.1049-1055, 2017.

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, Annual Joint Conference of the IEEE Computer and Communications INFOCOM, vol.3, pp.1976-1986, 2003.

J. Ding, M. Nemati, C. Ranaweera, and J. Choi, Iot connectivity technologies and applications: A survey, IEEE Access, vol.8, pp.67646-67673, 2020.

S. Tedeschi, C. Emmanouilidis, J. Mehnen, and R. Roy, A design approach to iot endpoint security for production machinery monitoring, Sensors, vol.19, issue.10, p.2355, 2019.

J. Yun, R. C. Teja, N. Chen, N. Sung, and J. Kim, Interworking of onem2m-based iot systems and legacy systems for consumer products, International Conference on Information and Communication Technology Convergence (ICTC), pp.423-428, 2016.

E. Baccelli, C. Gündogan, O. Hahm, P. Kietzmann, M. S. Lenders et al., Riot: An open source operating system for low-end embedded devices in the iot, IEEE Internet of Things Journal, vol.5, issue.6, pp.4428-4440, 2018.

X. Vilajosana, P. Tuset, T. Watteyne, and K. Pister, Openmote: Open-source prototyping platform for the industrial iot, International Conference on Ad Hoc Networks, pp.211-222, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01208417

B. Schneier, The Internet of Things Is Wildly Insecure -And Often Unpatchable, 2014.

F. J. Padilla, E. Baccelli, T. Eichinger, and K. Schleiser, The future of iot software must be updated, IAB Workshop on Internet of Things Software Update (IoTSU), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01369681

T. Walshe and A. Simpson, An empirical study of bug bounty programs, IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF), pp.35-44, 2020.

P. Kearney, Iot security: Experience is an expensive teacher, The Internet of Things: From Data to, Insight, pp.107-120, 2020.

M. Bishop, About penetration testing, IEEE Security & Privacy, vol.5, issue.6, pp.84-87, 2007.

F. Alkhabbas, R. Spalazzese, and P. Davidsson, Characterizing internet of things systems through taxonomies: A systematic mapping study, Internet of Things, vol.7, p.100084, 2019.

M. Shrestha, C. Johansen, J. Noll, and D. Roverso, A methodology for security classification applied to smart grid infrastructures, International Journal of Critical Infrastructure Protection, vol.28, p.100342, 2020.

P. Williams, P. Rojas, and M. Bayoumi, 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp.560-565, 2019.

S. N. Matheu, J. L. Hernandez-ramos, and A. F. Skarmeta, Toward a cybersecurity certification framework for the internet of things, IEEE Security & Privacy, vol.17, issue.3, pp.66-76, 2019.

G. Baldini, A. Skarmeta, E. Fourneret, R. Neisse, B. Legeard et al., Security certification and labelling in internet of things, 3rd World Forum on Internet of Things (WF-IoT), pp.627-632, 2016.

D. A. Robles-ramirez, P. J. Escamilla-ambrosio, and T. Tryfonas, Iotsec: Uml extension for internet of things systems security modelling, International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE), pp.151-156, 2017.

S. L. Keoh, S. S. Kumar, and H. Tschofenig, Securing the internet of things: A standardization perspective, IEEE Internet of things Journal, vol.1, issue.3, pp.265-275, 2014.

S. M. Fattah, N. Sung, I. Ahn, M. Ryu, and J. Yun, Building iot services for aging in place using standard-based iot platforms and heterogeneous iot products, Sensors, vol.17, issue.10, p.2311, 2017.