Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015. ,
Internet of things in industries: A survey, IEEE Transactions on industrial informatics, vol.10, issue.4, pp.2233-2243, 2014. ,
Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Comp. Syst, vol.29, issue.7, pp.1645-1660, 2013. ,
, Security, privacy and trust in internet of things: The road ahead, vol.76, pp.146-164, 2015.
, Gartner says 5.8 billion enterprise and automotive iot endpoints will be in use in 2020, 2019.
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, IEEE Internet of Things Journal, vol.4, issue.5, pp.1125-1142, 2017. ,
Building smart cities applications using iot and cloud-based architectures, International Conference on Industrial Informatics and Computer Systems (CIICS), pp.1-5, 2016. ,
How drones can find and hack internet-of-things devices from the sky, 2019. ,
Z-wave downgrade attack left over 100 million iot devices open to hackers, 2019. ,
Blueborne: Critical bluetooth attack puts billions of devices at risk of hacking, 2019. ,
Hackers could turn LG smart appliances into remote-controlled spy robot, 2019. ,
IoDDoSthe internet of distributed denial of sevice attacks -A case study of the mirai malware and iot-based botnets, 2017. ,
Hacking medical devices for fun and insulin: Breaking the human SCADA system, 2011. ,
Hackers can remotely access syringe infusion pumps to deliver fatal overdoses, 2019. ,
, Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer, 2019.
How to Hack Smart Bluetooth Locks and IoT Devices -Check this Out, 2019. ,
Security evaluation of the z-wave wireless protocol, Black hat USA, vol.24, 2013. ,
Bluetooth: With low energy comes low security, 7th USENIX Workshop on Offensive Technologies, WOOT, USENIX Association, 2013. ,
Security considerations for the WirelessHART protocol, International Conference on Emerging Technologies and Factory Automation (ETFA), pp.1-8, 2009. ,
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards, Computer Communications, vol.30, issue.7, pp.1655-1695, 2007. ,
Survey on security in internet of things: state of the art and challenges, International Conference on Advanced Communication Technology (ICACT), pp.699-704, 2017. ,
Survey on secure communication protocols for the internet of things, Ad Hoc Networks, vol.32, pp.17-31, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01272046
Practical security overview of IEEE, International Conference on Engineering & MIS (ICEMIS), pp.1-9, 2016. ,
Security for practical CoAP applications: Issues and solution approaches, 10th GI/ITG KuVS Fachgespraech Sensornetze, pp.15-16, 2011. ,
, A survey on application layer protocols for the internet of things, vol.3, pp.11-17, 2015.
Attacks and defenses in short-range wireless technologies for iot, IEEE Access, vol.8, pp.88892-88932, 2020. ,
Internet of things: Survey on security and privacy, 2017. ,
, 2017 International Symposium on Networks, Computers and Communications, pp.1-6, 2017.
Internet of things security: A survey, J. Network and Computer Applications, vol.88, pp.10-28, 2017. ,
Internet of things: A survey on the security of iot frameworks, J. Inf. Sec. Appl, vol.38, pp.8-27, 2018. ,
A survey on the internet of things security, International Conference on Computational Intelligence and Security (CIS), pp.663-667, 2013. ,
Osi reference model: An overview, International Journal of Computer Trends and Technology (IJCTT), vol.7, issue.4, pp.214-218, 2014. ,
TCP/IP protocol suite, 2002. ,
Nb-iot system for m2m communication, wireless communications and networking conference (WCNC), pp.1-5, 2016. ,
, IEEE Standards Association, 802.15.4-2015 -IEEE Standard for Low-Rate Wireless Networks
, 6LoWPAN: Incorporating IEEE 802.15. 4 into the IP architecture, 2009.
, , 2014.
Compression format for ipv6 datagrams over ieee 802.15.4-based networks, 2011. ,
Transmission of ipv6 packets over ieee 802.15.4 networks, 2007. ,
Implementation and evaluation of a TCP header compression for 6lowpan, International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1359-1364, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-02301807
The constrained application protocol (coap), 2014. ,
Security analysis of IoT protocols: A focus in CoAP, International Conference on Big Data and Smart City (ICBDSC), pp.1-7, 2016. ,
CoAP: An application protocol for billions of tiny internet nodes, IEEE Internet Computing, vol.16, issue.2, pp.62-67, 2012. ,
The design and implementation of datagram TLS, Network and Distributed System Security Symposium (NDSS), 2004. ,
DTLS based security and two-way authentication for the internet of things, Ad Hoc Networks, vol.11, issue.8, pp.2710-2723, 2013. ,
, 6lowpan compressed DTLS for CoAP, in: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp.287-289, 2012.
, MQTT version 3.1.1, OASIS Standard, 2014.
Forwarding techniques for IP fragmented packets in a real 6lowpan network, Sensors, vol.11, issue.1, pp.992-1008, 2011. ,
Route-over vs mesh-under routing in 6lowpan, International conference on wireless communications and mobile computing: Connecting the world wirelessly, pp.1208-1212, 2009. ,
Ad hoc on-demand distance vector (AODV) routing, RFC 3561, 2003. ,
Internet-Draft draft-daniel-6lowpan-load-adhoc-routing-03, IETF Secretariat, 6LoWPAN ad hoc on-demand distance vector routing (LOAD), 2007. ,
, Vehicular Technology Conference (VTC), pp.1-5, 2012.
RPL: the routing standard for the internet of things... or is it?, IEEE Communications Magazine, vol.54, pp.16-22, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01647152
Rpl: Ipv6 routing protocol for low-power and lossy networks, 2012. ,
RPL: The IP routing protocol designed for low power and lossy networks, Internet Protocol for Smart Objects Alliance, 2011. ,
Demo abstract: Securing communication in 6lowpan with compressed ipsec, International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp.1-2, 2011. ,
Lightweight ikev2: a key management solution for both the compressed ipsec and the ieee 802.15. 4 security, Proceedings of the IETF workshop on smart object security, vol.23, 2012. ,
, , 2019.
Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology, Sensors, vol.12, issue.9, pp.11734-11753, 2012. ,
Bluetooth specification version 5, 2019. ,
,
Bluetooth Mesh Networking specification ,
Bluetooth low energy mesh networks: A survey, Sensors, vol.17, issue.7, p.1467, 2017. ,
Mailloux, The Z-Wave routing protocol and its security implications, Computers & Security, vol.68, pp.112-129, 2017. ,
9959 based wireless systems used in critical infrastructure assets, 9th International Conference Critical Infrastructure Protection (ICCIP), pp.209-227, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01431003
WirelessHART: Real-Time Mesh Network for Industrial Automation, 2010. ,
Wirelesshart: Applying wireless technology in real-time industrial process control, Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.377-386, 2008. ,
A graph route-based superframe scheduling scheme in wirelesshart mesh networks for high robustness, Wireless Personal Communications, vol.71, issue.4, pp.2431-2444, 2013. ,
LoRaWAN Specification, 2015. ,
, Objets connectés : polémique sur la sécurité du réseau français Sigfox, 2019.
Attack scenarios and security analysis of MQTT communication protocol in IoT system, International Conference on Electrical Engineering, pp.1-6, 2017. ,
Gattacking bluetooth smart devices, 2016. ,
Exploiting bluetooth low energy pairing vulnerability in telemedicine, International Telemetering Conference Proceedings, International Foundation for Telemetering, 2015. ,
Security analysis of zigbee, 2017. ,
Lorawan: Vulnerability analysis and practical exploitation, 2017. ,
, International Conference on Internet-of-Things Design and Implementation (IoTDI), pp.129-140, 2018.
Auditing 6lowpan networks using standard penetration testing tools, DEF CON, vol.24, 2016. ,
An active man-in-the-middle attack on bluetooth smart devices, International Journal of Safety and Security Engineering, vol.8, issue.2, pp.200-211, 2018. ,
Three practical attacks against zigbee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned, International Conference on Hybrid Intelligent Systems (HIS), pp.199-206, 2014. ,
Security attacks to ZigBee technology and their practical realization, International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp.345-349, 2014. ,
Rogue z-wave controllers: A persistent attack channel, Local Computer Networks Conference Workshops (LCN), pp.734-741, 2015. ,
A survey: Attacks on RPL and 6LoWPAN in IoT, International Conference on Pervasive Computing (ICPC), pp.1-6, 2015. ,
Routing attacks and countermeasures in the RPLbased internet of things, International Journal of Distributed Sensor Networks (IJDSN), p.9, 2013. ,
An approach to mitigating sybil attack in wireless networks using zigBee, International Conference on Advanced Communication Technology (ICACT), vol.2, pp.1005-1009, 2008. ,
Modeling and analyses of ip spoofing attack in 6lowpan network, Computers & Security, vol.70, pp.95-110, 2017. ,
Implementation of a wormhole attack against a RPL network: Challenges and effects, 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp.95-102, 2018. ,
Exploring the security vulnerabilities of LoRa, International Conference on Cybernetics (CYB-CONF), pp.1-6, 2017. ,
Message denial and alteration on IEEE 802.15. 4 low-power radio networks, International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2011. ,
Thwarting attacks on ZigBee-Removal of the Killer-Bee stinger, International Conference on Network and Service Management (CNSM), pp.219-226, 2013. ,
Mitigation strategy of sinkhole attack in Wireless Sensor Network, International Workshop on Big Data and Information Security (IWBIS), pp.119-125, 2017. ,
My smart home is under attack, International Conference on Computational Science and Engineering (CSE), pp.145-151, 2015. ,
Exploring security in zigbee networks, Cyber and Information Security Research Conference (CISR), pp.25-28, 2014. ,
, BtleJuice: the Bluetooth Smart MitM Framework, DEF CON 24 Internet of Things Village, 2016.
Analysis of a denial of service attack on tcp, IEEE Symposium on Security and Privacy, pp.208-223, 1997. ,
Reato: Reacting to denial of service attacks in the internet of things, Computer Networks, vol.137, pp.37-48, 2018. ,
Security issue of wirelesshart based SCADA systems, International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.225-241, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01387616
The sybil attack, International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002. ,
Performance evaluation of RPL protocol under mobile sybil attacks, pp.1049-1055, 2017. ,
Packet leashes: a defense against wormhole attacks in wireless networks, Annual Joint Conference of the IEEE Computer and Communications INFOCOM, vol.3, pp.1976-1986, 2003. ,
Iot connectivity technologies and applications: A survey, IEEE Access, vol.8, pp.67646-67673, 2020. ,
A design approach to iot endpoint security for production machinery monitoring, Sensors, vol.19, issue.10, p.2355, 2019. ,
Interworking of onem2m-based iot systems and legacy systems for consumer products, International Conference on Information and Communication Technology Convergence (ICTC), pp.423-428, 2016. ,
Riot: An open source operating system for low-end embedded devices in the iot, IEEE Internet of Things Journal, vol.5, issue.6, pp.4428-4440, 2018. ,
Openmote: Open-source prototyping platform for the industrial iot, International Conference on Ad Hoc Networks, pp.211-222, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01208417
, The Internet of Things Is Wildly Insecure -And Often Unpatchable, 2014.
The future of iot software must be updated, IAB Workshop on Internet of Things Software Update (IoTSU), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01369681
An empirical study of bug bounty programs, IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF), pp.35-44, 2020. ,
Iot security: Experience is an expensive teacher, The Internet of Things: From Data to, Insight, pp.107-120, 2020. ,
About penetration testing, IEEE Security & Privacy, vol.5, issue.6, pp.84-87, 2007. ,
Characterizing internet of things systems through taxonomies: A systematic mapping study, Internet of Things, vol.7, p.100084, 2019. ,
A methodology for security classification applied to smart grid infrastructures, International Journal of Critical Infrastructure Protection, vol.28, p.100342, 2020. ,
, 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp.560-565, 2019.
Toward a cybersecurity certification framework for the internet of things, IEEE Security & Privacy, vol.17, issue.3, pp.66-76, 2019. ,
Security certification and labelling in internet of things, 3rd World Forum on Internet of Things (WF-IoT), pp.627-632, 2016. ,
Iotsec: Uml extension for internet of things systems security modelling, International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE), pp.151-156, 2017. ,
Securing the internet of things: A standardization perspective, IEEE Internet of things Journal, vol.1, issue.3, pp.265-275, 2014. ,
Building iot services for aging in place using standard-based iot platforms and heterogeneous iot products, Sensors, vol.17, issue.10, p.2311, 2017. ,