The Internet of Things: A survey, Computer Networks, vol.54, issue.15, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications, Journal of Medical Systems, vol.23, issue.2, pp.93-101, 2012. ,
DOI : 10.1109/MNET.2009.4804335
Secure communication for smart iot objects: Protocol stacks, use cases and practical examples, Proc. of IEEE WoWMoM, 2012. ,
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.94-101, 2013. ,
DOI : 10.1109/TrustCom.2013.16
A high level protocol specification language for industrial security sensitive protocols ,
URL : https://hal.archives-ouvertes.fr/inria-00099882
Enabling Network-Layer Security on IPv6 Wireless Sensor Networks, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010. ,
DOI : 10.1109/GLOCOM.2010.5684293
Slimfit -a hip dex compression layer for the ip-based internet of things 6lowpan fragmentation attacks and metigation mechanisms, Proc. 6th ACM Conf. Security Privacy Wireless Mobile Networks, pp.55-66, 2013. ,
Smart Sensors and Sensing Technology, chapter Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes, 2008. ,
Slede, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.109-118, 2008. ,
DOI : 10.1145/1352533.1352551
Compression format for ipv6 datagrams over ieee 802.15.4-based networks, RFC IETF, vol.6282, 2011. ,
DOI : 10.17487/rfc6282
Tailoring end-to-end ip security protocols to the internet of things, Proc. of IEEE ICNP, 2013. ,
Towards viable certificate-based authentication for the internet of things, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, 2013. ,
Internet of things for m-health applications (iomt) AMA- IEEE medical technology conference on individualized healthcare, 2010. ,
Security and Privacy in Wireless Body Area Networks for Health Care Applications, Wireless Networks and Security, pp.165-187, 2013. ,
DOI : 10.1007/978-3-642-36169-2_6
Internet key exchange protocol version 2 (ikev2) RFC 5996, IETF, and H. Tschofenig. Securing the internet of things: A standardization perspective, 2010. ,
DOI : 10.17487/rfc5996
Energy comparison of aes and sha-1 for ubiquitous computing. Emerging Directions in Embedded and Ubiquitous Computing, Lecture Notes in Computer Science, 2006. ,
TinySec, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004. ,
DOI : 10.1145/1031495.1031515
data security and privacy in wireless body area networks. Wireless Technologies for E-healthcare, 2010. ,
DOI : 10.1109/mwc.2010.5416350
6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach, International Journal of Communication Systems, vol.25, issue.9, p.2012 ,
Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.327-332, 2010. ,
DOI : 10.1109/SUTC.2010.61
Formal analysis of facebook connect single signon authentication protocol, pp.22-28, 2011. ,
Avispa project deliverable d6.2: Specification of the problems in the high-level specification language, 2003. ,
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2007. ,
DOI : 10.1109/WiMob.2008.16
Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006. ,
DOI : 10.1109/IEMBS.2006.260060
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6807
Mikey-ticket: Ticket-based modes of key distribution in multimedia internet keying (mikey) ,
DOI : 10.17487/rfc6043
Security issues of wireless sensor networks in healthcare applications, BT Technology Journal, vol.29, issue.2, pp.138-144, 2006. ,
DOI : 10.1007/s10550-006-0051-8
Applications, challenges, and prospective in emerging body area networking technologies, IEEE Wireless Communications, vol.17, issue.1, 2010. ,
DOI : 10.1109/MWC.2010.5416354
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health, IEEE Communications Magazine, vol.44, issue.4, 2006. ,
DOI : 10.1109/MCOM.2006.1632652
Key management systems for sensor networks in the context of the Internet of Things, Computers & Electrical Engineering, vol.37, issue.2, 2011. ,
DOI : 10.1016/j.compeleceng.2011.01.009
Securing communication in 6LoWPAN with compressed IPsec, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011. ,
DOI : 10.1109/DCOSS.2011.5982177
URL : http://soda.swedish-ict.se/4183/1/raza11securing.pdf
Compression of ipsec ah and esp headers for constrained environments. draft-raza-6lowpanipsec- 00 (WiP), IETF, 2013, 2013. [refa] Avispa a tool for automated validation of internet security protocols ,
A new fair non-repudiation protocol for secure negotiation and contract signing, Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services, PST '06, p.16, 2006. ,
DOI : 10.1145/1501434.1501454
Lightweight ikev2: A key management solution for both compressed ipsec and ieee 802.15.4 security, IETF/IAB workshop on Smart Object Security, 2012. ,
SVELTE: Real-time intrusion detection in the Internet of Things, Ad hoc networks, pp.11-2013 ,
DOI : 10.1016/j.adhoc.2013.04.014
D-hip: A distributed key exchange scheme for hip-based internet of things, Proc. of IEEE WoWMoM, 2012. ,
Hip tiny exchange (tex): A distributed key exchange scheme for hip-based internet of things, Proc. of ComNet, 2012. ,
Model checking wireless sensor network security protocols: Tinysec + leap + tinypk, Telecommunication Systems, vol.40, pp.3-491, 2009. ,
A database in every sensor, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys '11, 2011. ,
DOI : 10.1145/2070942.2070974
Energy analysis of public-key cryptography for wireless sensor networks ,