R. M. Savola, P. Savolainen, A. Evesti, H. Abie, and M. Sihvonen, Riskdriven security metrics development for an e-health IoT application, Information Security for South Africa (ISSA), pp.1-6, 2015.

C. Doukas, T. Pliakas, and I. Maglogiannis, Mobile healthcare information management utilizing Cloud Computing and Android OS, Conf. Proc. Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. IEEE Eng. Med. Biol. Soc. Annu. Conf, vol.2010, pp.1037-1040, 2010.

W. T. Tang, C. M. Hu, and C. Y. Hsu, A mobile phone based homecare management system on the cloud, 2010 3rd International Conference on Biomedical Engineering and Informatics, vol.6, pp.2442-2445, 2010.

M. S. Karunarathne, S. A. Jones, S. W. Ekanayake, and P. N. Pathirana, Remote Monitoring System Enabling Cloud Technology upon Smart Phones and Inertial Sensors for Human Kinematics, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing (BdCloud), pp.137-142, 2014.

K. K. Tsoi, Y. H. Kuo, and H. M. Meng, A Data Capturing Platform in the Cloud for Behavioral Analysis among Smokers: An Application Platform for Public Health Research, 2015 IEEE International Congress on Big Data, pp.737-740, 2015.

D. Gachet, M. Buenaga, F. Aparicio, and V. Padrón, Integrating Internet of Things and Cloud Computing for Health Services Provisioning: The Virtual Cloud Carer Project, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp.918-921, 2012.

O. and C. R. , Summary of the HIPAA Privacy Rule, HHS.gov, p.28, 2008.

P. Gope and T. Hwang, BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network, IEEE Sens. J, vol.16, issue.5, pp.1368-1376, 2016.

M. R. Abdmeziem and D. Tandjaoui, An End-to-end Secure Key Management Protocol for e-Health Applications, Comput Electr Eng, vol.44, issue.C, pp.184-197, 2015.

S. L. Keoh, S. S. Kumar, and H. Tschofenig, Securing the Internet of Things: A Standardization Perspective, IEEE Internet Things J, vol.1, issue.3, pp.265-275, 2014.

O. Kocabas, T. Soyata, and M. K. Aktas, Emerging Security Mechanisms for Medical Cyber Physical Systems, IEEEACM Trans. Comput. Biol. Bioinforma. IEEE ACM, vol.13, issue.3, pp.401-416, 2016.

T. Gong, H. Huang, P. Li, K. Zhang, and H. Jiang, A Medical Healthcare System for Privacy Protection Based on IoT, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming, pp.217-222, 2015.

A. Sharma, T. Goyal, E. S. Pilli, A. P. Mazumdar, M. C. Govil et al., A Secure Hybrid Cloud Enabled architecture for Internet of Things, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp.274-279, 2015.

H. Abie and I. Balasingham, Risk-based Adaptive Security for Smart IoT in eHealth, Proceedings of the 7th International Conference on Body Area Networks, pp.269-275, 2012.

K. Habib and W. Leister, Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2015.

M. Hamdi and H. Abie, Game-based adaptive security in the Internet of Things for eHealth, 2014 IEEE International Conference on Communications (ICC), pp.920-925, 2014.

K. Sriprasadh and M. Kumar, Ant Colony Optimization Technique for Secure Various Data Retrieval in Cloud Computing, International Journal of Computer Science and Information Technologies, vol.5, issue.6, 2014.

A. and D. S. Tyagi, Providing Security for the Building Using Ant Colony Optimization Technique, International Journal of Scientific and Research Publications (IJSRP), 2013.

, Secure distributed system inspired by ant colonies for road traffic management in emergency situations, p.8, 2016.

Y. Lu and W. Hu, Study on the Application of Ant Colony Algorithm in the Route of Internet of Things, Int. J. Smart Home, vol.7, issue.3, pp.365-374

Y. Wang and C. Wang, Based on the Ant Colony Algorithm is a Distributed Intrusion Detection Method, Int. J. Secur. Its Appl, vol.9, issue.4, pp.141-152

P. Chhikara and A. K. Patel, Enhancing Network Security using Ant Colony Optimization, Gl obal Journal of Computer Science and Technology Network

E. Sensei,

-. Iot,

H. Naumann, . Iot/m2m, . Cookbook, and ©. Copyright, Harald Naumann, 2015.

A. Gyrard, P. Patel, K. Soumya, M. I. Datta, and . Ali, Semantic Web meets Internet of Things (IoT) and Web of Things (WoT), International Conference on Semantic Web, 2016.

D. Lake and R. Milito, Monique Morrow and Rajesh Vargheese Internet of Things: Architectural Framework for eHealth Security, Journal of ICT, vol.3, issue.4, pp.301-328, 2014.

, Ant Colony Optimization Marco Dorigo Thomas Stutzle, 2004.

R. G. Diestel and . Theory, , 2005.

F. Atay, I. Stojmenovic, and H. Yanikomeroglu, Generating Random Graphs for the Simulation of Wireless Ad Hoc, Actuator, Sensor, and Internet Networks, Proc. 8th IEEE Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM, 2007.

E. Bonabeau, M. Dorigo, and G. Theraulaz, Inspiration for optimization from social insect behaviour, Nature, vol.406, pp.39-42, 2000.

J. P. Hecker, K. Letendre, K. Stolleis, D. Washington, and M. E. Moses, Formica ex Machina: ant swarm foraging from physical to virtual and back again, Proceedings of the Eighth International Conference on Swarm Intelligence, 2012.

M. Brambilla, E. Ferrante, M. Birattari, and M. Dorigo, Swarm Robotics: A Review from the Swarm Engineering Perspective, IRIDIA Technical Report, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01405919

D. Le-phuoc, H. Q. Nguyen-mau, J. X. Parreira, and M. Hauswirth, A middleware framework for scalable management of linked streams, Web Semantics: Science, Services and Agents on the World Wide Web, vol.0, issue.0, 2012.

R. Beckers, J. L. Deneubourg, and S. Goss, Trail laying behavior during food recruitment in the antLasius niger (L.), vol.39, p.27, 1992.

P. Kumar and G. S. Raghavendra, On the Evaporation Mechanism in the Ant Colony Optimization Algorithms, Ann.Comp. Science Ser, vol.9, pp.51-56, 2011.

M. Bursa and L. Lhotska, Ant Colony Cooperative Strategy in Electrocardiogram and Electroencephalogram Data Clustering. In: Nature Inspired Cooperative Strategies for Optimization, pp.323-333, 2007.

P. Amorim, A continuous model of ant foraging with pheromones and trail formation, Proceeding Series of the Brazilian Society of Applied and Compu-tational Mathematics, vol.3, issue.1, 2015.

J. Handl, J. Knowles, and M. Dorigo, Ant-based clustering: a comparative study of its relative performance with respect to k-means, average link and 1d-som, Proceedings of the Third International Conference on Hybrid Intelligent Systems, 2003.

?. Pheromone, Evaporation and deposition : The process of accumulation and release of pheromone depending on the avilability of an edge to recah shotest path respectively