T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, IETF Std. RFC5246, 2008.

E. Rescorla and N. Modadugu, Datagram Transport Layer Security Version 1.2, IETF Std. RFC5246, 2012.
DOI : 10.17487/rfc6347

R. Hummen, H. Shafagh, S. Raza, T. Voigt, and K. Wehrle, Delegationbased Authentication and Authorization for the IP-based Internet of Things, Proc. of SECON. IEEE, 2014.

M. Vu?ini´vu?ini´c, B. Tourancheau, F. Rousseau, A. Duda, L. Damon et al., OSCAR: Object security architecture for the Internet of Things, pp.3-16, 2015.

J. Granjal, E. Monteiro, and J. S. Silva, On the Effectiveness of Endto-End Security for Internet-Integrated Sensing Applications, Proc. GreenCom. IEEE, pp.20-23, 2012.

S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, Lithe: Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal, vol.13, issue.10, pp.3711-3720, 2013.
DOI : 10.1109/JSEN.2013.2277656

M. Buettner, G. V. Yee, E. Anderson, and R. Han, X-MAC, Proceedings of the 4th international conference on Embedded networked sensor systems , SenSys '06, pp.307-320, 2006.
DOI : 10.1145/1182807.1182838

. Std, IEEE Standard for Local and metropolitan area networks?Part 15 Low-Rate Wireless Personal Area Networks (LR- WPANs) 1: MAC sublayer Standard for Local and metropolitan area networks?Part 15, Rate Wireless Personal Area Networks (LR- WPANs) Amendment 1: MAC sublayer, pp.802-817, 2011.

L. Seitz, S. Gerdes, G. Selander, M. Mani, S. S. Kumar et al., draft-seitz-ace-usecases-03 [work-in-progress, 2015.

A. Dunkels, The ContikiMAC Radio Duty Cycling Protocol Swedish Institute of Computer Science (SICS) The Contiki OS, Tech. Rep, vol.13, 2011.

F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, Cross-Level Sensor Network Simulation with COOJA, Proceedings. 2006 31st IEEE Conference on Local Computer Networks, 2006.
DOI : 10.1109/LCN.2006.322172

L. Varga, G. Romaniello, M. Vu?ini´vu?ini´c, M. Favre, A. Banciu et al., GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network, IEEE Internet of Things Journal, vol.2, issue.5, 2015.
DOI : 10.1109/JIOT.2015.2425431

URL : https://hal.archives-ouvertes.fr/hal-01188285

R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, Towards viable certificate-based authentication for the internet of things, Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, HotWiSec '13, pp.37-42, 2013.
DOI : 10.1145/2463183.2463193

A. Capossele, V. Cervo, G. De-cicco, and C. Petrioli, Security as a CoAP resource: An optimized DTLS implementation for the IoT, 2015 IEEE International Conference on Communications (ICC), pp.6-8, 2015.
DOI : 10.1109/ICC.2015.7248379

S. S. Kumar, S. L. Keoh, and H. Tschofenig, A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol for Smart Objects and Constrained Node Networks, IETF Std. draft-ietf-lwig-tls-minimal- 01 [work-in-progress], 2014.