[. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, 2010.
DOI : 10.1016/j.comnet.2010.05.010

[. Ameen, J. Liu, and K. Kwak, Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications, Journal of Medical Systems, vol.23, issue.2, pp.93-101, 2012.
DOI : 10.1109/MNET.2009.4804335

. Bbl-+-12-]-r, N. Bonetto, V. Bui, A. Lakkundi, A. Olivereau et al., Secure communication for smart iot objects: Protocol stacks, use cases and practical examples, Proc. of IEEE WoWMoM, 2012.

[. Boudguiga, A. Olivereau, and N. Oualha, Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.94-101, 2013.
DOI : 10.1109/TrustCom.2013.16

L. Chevalier, J. Compagna, P. Cuellar, J. Hankes-drielsma, L. Mantovani et al., A high level protocol specification language for industrial security sensitive protocols
URL : https://hal.archives-ouvertes.fr/inria-00099882

E. [. Granjal, J. Monteiro, and . Silva, Enabling Network-Layer Security on IPv6 Wireless Sensor Networks, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010.
DOI : 10.1109/GLOCOM.2010.5684293

J. Hhhw13-]-ren-hummen, M. Hiller, K. Henze, R. Wehrle, J. Hummen et al., Slimfit -a hip dex compression layer for the ip-based internet of things 6lowpan fragmentation attacks and metigation mechanisms, Proc. 6th ACM Conf. Security Privacy Wireless Mobile Networks, pp.55-66, 2013.

[. Healy, T. Newe, and E. Lewis, Smart Sensors and Sensing Technology, chapter Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes, 2008.

H. [. Hanna, W. Rajan, and . Zhang, Slede, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.109-118, 2008.
DOI : 10.1145/1352533.1352551

P. [. Hui and . Thubert, Compression format for ipv6 datagrams over ieee 802.15.4-based networks, RFC IETF, vol.6282, 2011.
DOI : 10.17487/rfc6282

H. W. Hwz-+-13-]-rene-hummen, H. Ziegeldorf, J. Hiller, and K. Wehrle, Tailoring end-to-end ip security protocols to the internet of things, Proc. of IEEE ICNP, 2013.

J. H. Hzs-+-13-]-ren-hummen, H. Ziegeldorf, S. Shafagh, K. Raza, and . Wehrle, Towards viable certificate-based authentication for the internet of things, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, 2013.

A. [. Istepanian, A. Jara, N. Sungoor, and . Philips, Internet of things for m-health applications (iomt) AMA- IEEE medical technology conference on individualized healthcare, 2010.

M. [. Javadi and . Razzaque, Security and Privacy in Wireless Body Area Networks for Health Care Applications, Wireless Networks and Security, pp.165-187, 2013.
DOI : 10.1007/978-3-642-36169-2_6

P. [. Kaufman, Y. Hoffman, P. Nir, and . Eronen, Internet key exchange protocol version 2 (ikev2) RFC 5996, IETF, and H. Tschofenig. Securing the internet of things: A standardization perspective, 2010.
DOI : 10.17487/rfc5996

B. [. Kaps and . Sunar, Energy comparison of aes and sha-1 for ubiquitous computing. Emerging Directions in Embedded and Ubiquitous Computing, Lecture Notes in Computer Science, 2006.

N. [. Karlof, D. Sastry, and . Wagner, TinySec, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004.
DOI : 10.1145/1031495.1031515

[. Li and W. Lou, data security and privacy in wireless body area networks. Wireless Technologies for E-healthcare, 2010.
DOI : 10.1109/mwc.2010.5416350

]. A. Lll-+-12, J. Le, A. Loo, M. Lasebae, Y. Aiash et al., 6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach, International Journal of Communication Systems, vol.25, issue.9, p.2012

T. [. Lim, Y. Oh, T. Choi, and . Lakshman, Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.327-332, 2010.
DOI : 10.1109/SUTC.2010.61

U. [. Marino and . Caterina, Formal analysis of facebook connect single signon authentication protocol, pp.22-28, 2011.

P. [. Moedersheim and . Drielsma, Avispa project deliverable d6.2: Specification of the problems in the high-level specification language, 2003.

F. [. De-meulenaer, F. Gosset, O. Standaert, G. Pereira, N. Montenegro et al., On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2007.
DOI : 10.1109/WiMob.2008.16

T. [. Meingast, E. Roosta, and . Lewis, Security and Privacy Issues with Health Care Information Technology, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, 2006.
DOI : 10.1109/IEMBS.2006.260060

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6807

T. [. Mattsson and . Tian, Mikey-ticket: Ticket-based modes of key distribution in multimedia internet keying (mikey)
DOI : 10.17487/rfc6043

M. [. Ng, C. M. Sim, and . Tan, Security issues of wireless sensor networks in healthcare applications, BT Technology Journal, vol.29, issue.2, pp.138-144, 2006.
DOI : 10.1007/s10550-006-0051-8

J. [. Patel and . Wang, Applications, challenges, and prospective in emerging body area networking technologies, IEEE Wireless Communications, vol.17, issue.1, 2010.
DOI : 10.1109/MWC.2010.5416354

Y. [. Poon, S. Zhang, and . Bao, A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health, IEEE Communications Magazine, vol.44, issue.4, 2006.
DOI : 10.1109/MCOM.2006.1632652

[. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, Key management systems for sensor networks in the context of the Internet of Things, Computers & Electrical Engineering, vol.37, issue.2, 2011.
DOI : 10.1016/j.compeleceng.2011.01.009

S. S. Raza, T. Duquennoy, D. Chung, T. Yazar, U. Voigt et al., Securing communication in 6LoWPAN with compressed IPsec, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011.
DOI : 10.1109/DCOSS.2011.5982177

URL : http://soda.swedish-ict.se/4183/1/raza11securing.pdf

S. [. Raza, G. Duquennoy, and . Selander, Compression of ipsec ah and esp headers for constrained environments. draft-raza-6lowpanipsec- 00 (WiP), IETF, 2013, 2013. [refa] Avispa a tool for automated validation of internet security protocols

[. Ruiz-martínez, C. Inmaculada-marín-lópez, L. Baño-lópez, and A. Skarmeta, A new fair non-repudiation protocol for secure negotiation and contract signing, Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services, PST '06, p.16, 2006.
DOI : 10.1145/1501434.1501454

[. Raza, T. Voigt, and V. Jutvik, Lightweight ikev2: A key management solution for both compressed ipsec and ieee 802.15.4 security, IETF/IAB workshop on Smart Object Security, 2012.

L. [. Raza, T. Wallgren, and . Voigt, SVELTE: Real-time intrusion detection in the Internet of Things, Ad hoc networks, pp.11-2013
DOI : 10.1016/j.adhoc.2013.04.014

]. Y. So12a, A. Saied, and . Olivereau, D-hip: A distributed key exchange scheme for hip-based internet of things, Proc. of IEEE WoWMoM, 2012.

]. Y. So12b, A. Saied, and . Olivereau, Hip tiny exchange (tex): A distributed key exchange scheme for hip-based internet of things, Proc. of ComNet, 2012.

. Tcc-+-09-]-l, D. Tobarra, F. Cazorla, G. Cuartero, E. Diaz et al., Model checking wireless sensor network security protocols: Tinysec + leap + tinypk, Telecommunication Systems, vol.40, pp.3-491, 2009.

A. [. Tsiftes and . Dunkels, A database in every sensor, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys '11, 2011.
DOI : 10.1145/2070942.2070974

. S. Wge-+-05-]-a, N. Wander, H. Gura, V. Eberle, S. C. Gupta et al., Energy analysis of public-key cryptography for wireless sensor networks