, 112 6.2.1 Identity and Access Control Management Module

. .. Summary, 132 Relationships Management Expand All Nodes Collapse All Nodes Clear Log Relationships Unconfirmed Relationships Employer-Employee Capability:AliceDoor-HouseKeeper-Claire The Relationship Information ( Capability:AliceDoor-HouseKe eper-Claire) Capability:{"sub1PartId":"16ha 2ocNdXqp8wk6kPiwSdtnxsuvt DHMFn:03d6ceed758c064d6c 12eb51aac63ecfeda65b8f474f 7c8f499c1df8c56c3411e8:Alic eDoor, sub2PartId":"1JgZyC kL1rpLVKtfqJbNnj6kTEnXF18o Sw:0331f3f713f6c712813481c 1c4666af19d09cb245350702d 3a217c8227991975e1:HouseK eeper-Claire"} Expand All Nodes Collapse All Nodes Clear Log Subject:Hospital Hierarchy randomSeed masterKey Root Identity:Hospital Partial Identity:Organizations Partial Identity:Therapeutic Partial Identity:Pharmacy Partial Identity:Pharmacy Identity: Financial Partial Identity:Bitcoin Partial Identity:Bank Appendix D

, where serviceResponse is the result of P 's request service. Step 6: For relationships, Claire can establish a relationship with Alice through the establishRelationshipRequest(IA, identif ier, relEstablishP ara), where the IA refers the identity proof of Claire, the identif ier is Claire's identifier, and the relEstablishP ara is the required parameters (e.g., label, identifiers, accessPoint, Service, and Capability) to establish the relationship, Step 5.4: V gives the service response requested by P , coupled with the IA of V through the responseSrv(serviceResponse, IA)

, Step 6.2: Alice verifies Claire's identity through the verif yIdentity(IA)

, IA, Claire.identif ier, Service), the lock or Alice (owner) firstly verifies the identity of Claire through verif yIdentity(IA). If the identity is valid, the lock continues to check the policies prescribed by Alice (owner) through checkP olicies(requestP ermissions), Step 6.3: Alice checks the relationship establishment request from Claire and gives the expired time of the relationship if Alice agrees on establishing the relationship through the establishRelationshipResponse(expiredT ime), vol.9

S. Azouvi, M. Al-bassam, and S. Meiklejohn, Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp.373-389, 2017.

K. Aberer, M. Hauswirth, and A. Salehi, A Middleware for Fast and Flexible Sensor Network Deployment, Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment, pp.1199-1202, 2006.

G. Alpár, J. Hoepman, and J. Siljee, The Identity Crisis. Security, Privacy and Usability Issues in Identity Management, 2011.

L. Atzori, A. Iera, and G. Morabito, From Smart Objects to Social Objects: The next Evolutionary Step of the Internet of Things, IEEE Communications Magazine, vol.52, issue.1, pp.97-105, 2014.

G. Ahn, M. Ko, and M. Shehab, Privacy-Enhanced User-Centric Identity Management, Proceedings of the 2009 IEEE International Conference on Communications, pp.1-5, 2009.

E. Aktoudianakis, Policy Templates for Relationship-Based Access Control, Proceedings of the 2013 Eleventh Annual International Conference on Privacy, Security and Trust, pp.221-228, 2013.

. Mahdi-ben-alaya, Toward Semantic Interoperability in oneM2M Architecture, IEEE Communications Magazine, vol.53, issue.12, pp.35-41, 2015.

M. Ali, Blockstack: Design and Implementation of a Global Naming System with Blockchains, 2016.

A. Alliance, Linux Foundation Collaborative Projects, 2016.

, Altair Engineering. Carriots -Internet of Things Platform | Home, 2018.

, Amazon. Amazon Web Services IoT Applications & Solutions. url, 2018.

P. Angin, An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing, Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems, pp.177-183, 2010.

A. M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, 2014.

T. Ahmed, F. Patwa, and R. Sandhu, Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration, Proceedings of the 2016 IEEE 17th International Conference on Information Reuse and Integration, pp.297-304, 2016.

P. Arjunan, Sensoract: A Privacy and Security Aware Federated Middleware for Building Management, Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, pp.80-87, 2012.

P. Arjunan, SensorAct: A Decentralized and Scriptable Middleware for Smart Energy Buildings, Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th

, Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), pp.11-19, 2015.

A. Armando, Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-Based Single Sign-on for Google Apps, Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering. FMSE '08, pp.1-10, 2008.

T. Ahmed, R. Sandhu, and J. Park, Classifying and Comparing Attribute-Based and Relationship-Based Access Control, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp.59-70, 2017.

L. Atzori, The Social Internet of Things (Siot)-When Social Networks Meet the Internet of Things: Concept, Architecture and Network Characterization, Computer Networks, vol.56, issue.16, pp.3594-3608, 2012.

D. Augot, A User-Centric System for Verified Identities on the Bitcoin Blockchain, Lecture Notes in Computer Science, pp.390-407, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01611251

D. Augot, Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01611297

, Amazon FreeRTOS -IoT Operating System for Microcontrollers, AWS, 2018.

, AWS. AWS Greengrass -Amazon Web Services, 2018.

. Aws and . Aws, IoT 1-Click Overview -One Click Creation of an AWS Lambda Trigger for Any Device, 2018.

, AWS. AWS IoT Core Overview -Amazon Web Services. url, 2018.

L. Axon, Privacy-Awareness in Blockchain-Based PKI, 2015.

S. Bandyopadhyay, A Survey of Middleware for Internet of Things, vol.162, pp.288-296, 2011.

M. Burrows, M. Abadi, and R. M. Needham, A Logic of Authentication, Proceedings of the Royal Society of London A: Mathematical, vol.426, pp.233-271, 1989.

M. Al-bassam, SCPKI: A Smart Contract-Based PKI and Identity System, Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp.35-40, 2017.

F. Bao and I. Chen, Dynamic Trust Management for Internet of Things Applications, Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, pp.1-6, 2012.

C. Bell, Beginning Sensor Networks with Arduino and Raspberry Pi, 2014.

E. Ben-sasson, SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge, Advances in Cryptology-CRYPTO 2013, pp.90-108, 2013.

E. Ben-sasson, Scalable, Transparent, and Post-Quantum Secure Computational Integrity, 2017.

M. Brown and R. Housley, Transport Layer Security (TLS) Authorization Extensions. RFC Editor, 2010.

A. Stephen and . Billings, Nonlinear System Identification: NARMAX Methods in the Time, Frequency, and Spatio-Temporal Domains, 2013.

. Bitnation and . Bitnation, , 2018.

T. Borgohain, U. Kumar, and S. Sanyal, Survey of Security and Privacy Issues of Internet of Things, 2015.

F. Bonomi, Fog Computing and Its Role in the Internet of Things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp.13-16, 2012.

Y. Borse, Anonymity: A Secure Identity Management Using Smart Contracts, 2019.

G. Bu and M. Potop-butucaru, BAN-GZKP: Optimal Zero Knowledge Proof Based Scheme for Wireless Body Area Networks, Ad Hoc Networks, vol.77, pp.28-41, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01702082

S. Bhatt, F. Patwa, and R. Sandhu, An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine, Collaboration and Internet Computing (CIC), pp.37-45, 2016.

S. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

G. Bruns, Relationship-Based Access Control: Its Expression and Enforcement through Hybrid Logic, Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp.117-124, 2012.

V. Bertocci, G. Serack, and C. Baker, Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities, 2007.

H. Victor, E. N. Benitez, A. G. Sanchez, and . Loukianov, Decentralized Adaptive Recurrent Neural Control Structure, Engineering Applications of Artificial Intelligence, vol.20, issue.8, pp.1125-1132, 2007.

E. Bertino and K. Takahashi, Identity Management: Concepts, Technologies, and Systems, 2011.

B. Bünz, Bulletproofs: Short Proofs for Confidential Transactions and More, 2018.

, BUTLER. uBiquitous, secUre inTernet-of-Things with Location and contExt-awaReness, 2014.

V. Buterin, A Next Generation Smart Contract & Decentralized Application Platform, 2014.

. Butler-smart-gateway, Open Platforms -sensiNact, url: http, 2015.

L. Butler, Protection, ACM SIGOPS Operating Systems Review, vol.8, pp.18-24, 1974.

R. J. Caro, Smepp: A Secure Middleware for Embedded P2p, ICT Mobile and Wireless Communications Summit (ICT-MobileSummit'09), 2009.

R. Chen, F. Bao, and J. Guo, Trust-Based Service Management for Social Internet of Things Systems, IEEE Transactions on Dependable and Secure Computing, vol.13, issue.6, pp.684-696, 2016.

J. Michael, R. Covington, and . Carskadden, Threat Implications of the Internet of Things, Cyber Conflict (CyCon), 2013 5th International Conference On, pp.1-12, 2013.

. Certicom, SEC 2: Recommended Elliptic Curve Domain Parameters, 1999.

D. Chen, TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things, Computer Science and Information Systems, vol.8, issue.4, pp.1207-1228, 2011.

. Civic, Civic Secure Identity Ecosystem -Decentralized Identity & Reusable KYC, 2018.

. Cloudplugs, Industrial Internet of Things, 2018.

. Cloudplugs, Internet Of Things Platform, Industrial IoT, Industry 4.0, Public Cloud, 2018.

A. Moumena, N. Chaqfeh, and . Mohamed, Challenges in Middleware Solutions for the Internet of Things, Collaboration Technologies and Systems (CTS), 2012 International Conference On, pp.21-26, 2012.

P. Cobb, German Steel Mill Meltdown: Rising Stakes in the Internet of Things, 2015.

. Consensys, Harness the Power of Ethereum, 2018.

D. Conzon, The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications, 21st International Conference on Computer Communications and Networks (ICCCN), pp.1-6, 2012.

. Corero, The Mirai Botnet: All About the Latest Malware DDoS Attack Type | Corero, 2016.

Y. Cheng, J. Park, and R. Sandhu, Attribute-Aware Relationship-Based Access Control for Online Social Networks, Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, pp.292-306, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01284863

S. Cantor and T. Scavo, Shibboleth Architecture, Protocols and Profiles, vol.10, p.16, 2005.

O. Can and O. K. Sahingoz, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), pp.1-6, 2015.

. Cspan and . Senate, Banking Committee Hearing on Equifax Data Breach, 2017.

. Daidalos and . Daidalos, , 2003.

T. Dang, On Evaluating IoTivity Cloud Platform, International Conference on Computational Science and Its Applications, pp.137-147, 2017.

. Soumya-kanti-datta, oneM2M Architecture Based User Centric IoT Application Development, 2015 3rd International Conference On, pp.100-107, 2015.

. Soumya-kanti-datta, oneM2M Architecture Based IoT Framework for Mobile Crowd Sensing in Smart Cities, Proceedings of the 2016 European Conference on Networks and Communications (EuCNC), pp.168-173, 2016.

. Dataart, DeviceHive -Open Source IoT Data Platform with the Wide Range of Integration Options, 2013.

H. Dobbertin, A. Bosselaers, and B. Preneel, RIPEMD-160: A Strengthened Version of RIPEMD, Proceedings of the International Workshop on Fast Software Encryption, pp.71-82, 1996.

A. Mauro and . Cruz, A Reference Model for Internet of Things Middleware, IEEE Internet of Things Journal, vol.5, pp.871-883, 2018.

L. Souza, Socrades: A Web Service Based Shop Floor Integration Infrastructure, The Internet of Things, pp.50-67, 2008.

T. Dimitriou, A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, pp.59-66, 2005.

T. Tuan and A. Dinh, Blockbench: A Framework for Analyzing Private Blockchains, Proceedings of the 2017 ACM International Conference on Management of Data, pp.1085-1100, 2017.

. Ivar and . Van-thanh, The Ambiguity of Identity, Identity Management, p.3, 2007.

A. Dorri, Blockchain for IoT Security and Privacy: The Case Study of a Smart Home, Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp.618-623, 2017.

B. Dournaee and . Security, , 2002.

C. Flávia, P. F. Delicato, T. Pires, and . Batista, Middleware Solutions for the Internet of Things, 2013.

L. J. Chao-ding, M. Yang, and . Wu, Security Architecture and Key Technologies for IoT/CPS, ZTE technology journal, vol.17, issue.1, pp.11-16, 2011.

D. Evans and D. M. Eyers, Efficient Data Tagging for Managing Privacy in the Internet of Things, Proceedings of the 2012 IEEE International Conference on Green Computing and Communications (GreenCom)

, IEEE, pp.244-248, 2012.

C. Elena-lenz, Internet of Things: Six Key Characteristics, 2014.

M. Eisenhauer, P. Rosengren, and P. Antolin, A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems, Proceedings of the 6th IEEE Annual Communications Society Conference on Sensor, pp.1-3, 2009.

C. Elbaz, L. Rilling, and C. Morin, Reactive and Adaptive Security Monitoring in Cloud Computing, IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS* W), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01884739

, IEEE, pp.5-7, 2018.

M. Elkhodr, S. Shahrestani, and H. Cheung, A Middleware for the Internet of Things, 2016.

. Evernym, Self-Sovereign Identity, 2018.

. Evrythng and . Evrythng, IoT Smart Products Platform, 2018.

B. Faber, BPDIMS: A Blockchain-Based Personal Data and Identity Management System, Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.

I. Farris, Taking the SIoT down from the Cloud: Integrating the Social Internet of Things in the INPUT Architecture, IEEE 2nd World Forum on Internet of Things (WF-IoT, pp.35-39, 2015.

H. Gabriel and C. Ferreira, Proposal of a Secure, Deployable and Transparent Middleware for Internet of Things, Proceedings of the 9th Iberian Conference on Information Systems and Technologies (CISTI), pp.1-4, 2014.

G. Fersi, Middleware for Internet of Things: A Study, Proceedings of the 2015 International Conference on Distributed Computing in Sensor Systems, pp.230-235, 2015.

K. Fischer and J. Geßner, Security Architecture Elements for IoT Enabled Automation Networks, Proceedings of the 2012 IEEE 17th Conference on Emerging Technologies & Factory Automation (ETFA), pp.1-8, 2012.

S. Fayssal, S. Hariri, and Y. Al-nashif, Anomaly-Based Behavior Analysis of Wireless Network Security, Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp.1-8, 2007.

C. Fuhrhop, J. Lyle, and S. Faily, The Webinos Project, Proceedings of the 21st International Conference on World Wide Web, pp.259-262, 2012.

W. L. Philip and . Fong, Relationship-Based Access Control: Protection Model and Policy Language, Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp.191-202, 2011.

P. Forrest, The Identity of Indiscernibles, 1996.

P. Fremantle, A Reference Architecture for the Internet of Things, 2014.

P. Fremantle, A Reference Architecture for the Internet of Things, 2015.

P. Fremantle and P. Scott, A Survey of Secure Middleware for the Internet of Things, PeerJ Computer Science, vol.3, p.114, 2017.

C. Fuhrhop, D3.7: Final Webinos Specification, p.1046, 2013.

A. Al-fuqaha, Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015.

C. Fromknecht, D. Velicanu, and S. Yakoubov, A Decentralized Public Key Infrastructure with Identity Retention, IACR Cryptology ePrint Archive, vol.2014, p.803, 2014.

C. Fromknecht, D. Velicanu, and S. Yakoubov, CertCoin: A NameCoin Based Decentralized Authentication System 6.857 Class Project, 2014.

Z. Gao, Blockchain-Based Identity Management with Mobile Device, Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems -CryBlock'18, pp.66-70, 2018.

]. Bibliography-[gar, . Gartner, and . Gartner, Fueling the Future of Business, 2018.

. Gartner, Gartner Says 8.4 Billion Connected, 2017.

A. Gatouillat, Y. Badr, and B. Massot, Smart and Safe Self-Adaption of Connected Devices Based on Discrete Controllers, IET Software, vol.13, issue.1, pp.49-59, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01854053

A. Gervais, On the Security and Performance of Proof of Work Blockchains, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.3-16, 2016.

L. Greenemeier and L. Greenemeier, Recall Shows That a Hack Attack on Car Controls Is a Credible Threat, 2015.

R. Giaffreda, iCore: A Cognitive Management Framework for the Internet of Things, The Future Internet Assembly, pp.350-352, 2013.

A. Glikson, Fi-Ware: Core Platform for Future Internet Applications, Proceedings of the 4th Annual International Conference on Systems and Storage, 2011.

R. Girau, S. Martis, and L. Atzori, Neighbor Discovery Algorithms for Friendship Establishment in the Social Internet of Things, Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp.165-170, 2016.

I. Giacomelli, J. Madsen, and C. Orlandi, ZKBoo: Faster Zero-Knowledge for Boolean Circuits, USENIX Security Symposium, pp.1069-1083, 2016.

S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on computing, vol.18, issue.1, pp.186-208, 1989.

A. Gómez-goiri, Otsopack: Lightweight Semantic Framework for Interoperable Ambient Intelligence Applications, Computers in Human Behavior, vol.30, pp.460-467, 2014.

. Google and . Cloud-iot-core, , 2018.

. Google, Cloud IoT Edge -Extending Google Cloud's AI & ML, 2018.

. Google, Google Cloud IoT -Fully Managed IoT Services, 2018.

S. Gusmeroli, S. Piccione, and D. Rotondi, IoT@Work Automation Middleware System Design and Architecture, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies Factory Automation, pp.1-8, 2012.

S. Gusmeroli, S. Piccione, and D. Rotondi, A Capability-Based Security Approach to Manage Access Control in the Internet of Things, Mathematical and Computer Modelling, vol.58, pp.1189-1205, 2013.

L. Greenemeier, Recall Shows That a Hack Attack on Car Controls Is a Credible Threat, Scientific American, 2015.

C. Guindon, Eclipse Higgins, 2008.

H. Halpin, NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging, Proceedings of the 12th International Conference on Availability, Reliability and Security, p.92, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673292

D. Hardt, The OAuth 2.0 Authorization Framework, 2012.

O. Hasan, A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01339185

S. S. Haykin, Neural Networks and Learning Machines, vol.3, 2009.

O. Hasan, L. Brunie, and E. Bertino, Preserving Privacy of Feedback Providers in Decentralized Reputation Systems, Computers & Security, vol.31, issue.7, pp.816-826, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01352961

D. Hussein, E. Bertin, and V. Frey, A Community-Driven Access Control Approach in Distributed IoT Environments, IEEE Communications Magazine, vol.55, issue.3, pp.146-153, 2017.

T. Hansen and D. Eastlake, US Secure Hash Algorithms (SHA and SHA-Based HMAC and HKDF)

L. José and . Hernández-ramos, Distributed Capability-Based Access Control for the Internet of Things, Journal of Internet Services and Information Security, vol.3, issue.3/4, pp.1-16, 2013.

M. Md-mahmud-hossain, R. Fotouhi, and . Hasan, Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things, Proceedings of the 2015 IEEE World Congress on Services, pp.21-28, 2015.

A. Garrote-hernández, N. María, and . Moreno-garcía, A Formal Definition of RESTful Semantic Web Services, Proceedings of the First International Workshop on RESTful Design, pp.39-45, 2010.

J. Hughes and E. Maler, Security Assertion Markup Language (Saml) v2. 0 Technical Overview, pp.29-38, 2005.

D. Hodgson, Know Your Customer: Marketing, Governmentality and the New Consumer of Financial Services, Management Decision, vol.40, issue.4, pp.318-328, 2002.

]. Hp-+13 and . Huth, IoT@Work -D1.3 -Final Framework Architecture Specification, 2013.

T. Hardjono and A. S. Pentland, Verifiable Anonymous Identities and Access Control in Permissioned Blockchains, 2016.

X. Huang, User Interactive Internet of Things Privacy Preserved Access Control, Proceedings of the 2012 International Conference for Internet Technology And Secured Transactions, pp.597-602, 2012.

-. Ibm.-iot-platform and . Iot, , 2018.

. Ibm, Introduction to Service Data Objects, 2004.

. Id2020 and . An, Alliance Commited to Improving Lives Through Digital Identity, 2018.

M. Isaac and S. Frenkel, Facebook Security Breach Exposes Accounts of 50 Million Users, The New York Times. Technology, pp.362-4331, 2018.

M. Isa, A Lightweight and Secure TFTP Protocol for Smart Environment, Proceedings of the 2012 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp.302-306, 2012.

. Itu-t and Y. Itu-t-recommendation, NGN Identity Management Framework, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks, 2009.

. Itu-t and Y. Itu-t-recommendation, Overview of the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks, 2012.

. Itu-t and Y. Itu-t-recommendation, Terms and Definitions for the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks, 2012.

M. Jawurek, F. Kerschbaum, and C. Orlandi, Zero-Knowledge Using Garbled Circuits: How to Prove Non-Algebraic Statements Efficiently, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp.955-966, 2013.

P. Jokar, H. Nicanfar, . Victor, and . Leung, Specification-Based Intrusion Detection for Home Area Networks in Smart Grids, Proceedings of the 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.208-213, 2011.

. Jolocom, Decentralized Infrastructure for Self-Sovereign Identity, 2018.

A. Jøsang and S. Pope, AusCERT Asia Pacific Information Technology Security Conference. Citeseer, p.77, 2005.

P. Jogalekar and M. Woodside, Evaluating the Scalability of Distributed Systems, IEEE Transactions on parallel and distributed systems, vol.11, issue.6, pp.589-603, 2000.

A. Jøsang, A. Muhammed, S. Zomai, and . Suriadi, Usability and Privacy in Identity Management Architectures, Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, pp.143-152, 2007.

. Kaaiot, Kaa Open-Source IoT Platform, 2014.

. Kantara and . Kantara-initiative, , 2009.

J. Kim and J. Lee, OpenIoT: An Open Service Framework for the Internet of Things, Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT, pp.89-93, 2014.

N. Koblitz, CM-Curves with Good Cryptographic Properties, Proceedings of the Annual International Cryptology Conference, pp.279-287, 1991.

N. Khernane, M. Potop-butucaru, and C. Chaudet, BANZKP: A Secure Authentication Scheme Using Zero Knowledge Proof for WBANs, Proceedings of the 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp.307-315, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01340209

J. Lee, BIDaaS: Blockchain Based ID As a Service, IEEE Access, vol.6, pp.2274-2278, 2018.

B. Leiding, Authcoin: Validation and Authentication in Decentralized Networks, 2016.

T. Levendovszky, Distributed Real-Time Managed Systems: A Model-Driven Distributed Secure Information Architecture Platform for Managed Embedded Systems, IEEE software, vol.31, pp.62-69, 2014.

. Liberty, The Liberty Alliance Project, 2001.

Y. Liu, An Identity Management System Based on Blockchain, Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust, pp.44-53, 2017.

X. Li and S. Moh, Middleware Systems for Wireless Sensor Networks: A Comparative Survey, Contemporary Engineering Sciences, vol.7, issue.13, pp.649-660, 2014.

. Losant, Losant Security Overview Documentation, 2018.

. Losant, The Losant Enterprise IoT Platform, 2018.

J. Lyle, On the Design and Development of Webinos: A Distributed Mobile Application Middleware, Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems, pp.140-147, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01527646

J. Lyle, Webinos D3.5: Webinos Phase 1 Security Framework, p.125, 2011.

C. H. Liu, B. Yang, and T. Liu, Efficient Naming, Addressing and Profile Services in Internet-of-Things Sensory Environments, Ad Hoc Networks, vol.18, pp.85-101, 2014.

R. Mahmoud, Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures, Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.336-341, 2015.

V. Matyá?, The Future of Identity in the Information Society, vol.298, 2009.

B. Mccarty, Selinux: Nsa's Open Source Security Enhanced Linux, vol.238, 2005.

L. Ma, Y. Ge, and Y. Zhu, TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks, Wireless personal communications, vol.77, issue.2, pp.1077-1090, 2014.

M. Azure, Azure Internet of Things -IoT for Every Business, 2018.

F. Damiano-di, P. Maesa, L. Mori, and . Ricci, Distributed Applications and Interoperable Systems, Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems, pp.206-220, 2017.

D. C. Montgomery, Statistical Quality Control, vol.7, 2009.

H. Mousa, Trust Management and Reputation Systems in Mobile Participatory Sensing Applications: A Survey, Computer Networks, vol.90, pp.49-73, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01265403

E. Maler and D. Reed, The Venn of Identity: Options and Issues in Federated Identity Management, IEEE Security & Privacy, vol.6, 2008.

K. Pratyusa, J. M. Manadhata, and . Wing, An Attack Surface Metric, IEEE Transactions on Software Engineering, vol.37, issue.3, pp.371-386, 2011.

S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.

. Namecoin and . Namecoin, , 2014.

P. Bou-nassar, Risk Management and Security in Service-Based Architectures, Proceedings of the 2009 International Conference on Advances in Computational Tools for Engineering Applications, pp.214-218, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00389155

R. Neisse, A Model-Based Security Toolkit for the Internet of Things, Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security, pp.78-87, 2014.

M. Nitti, R. Girau, and L. Atzori, Trustworthiness Management in the Social Internet of Things, IEEE Transactions on knowledge and data engineering, vol.26, issue.5, pp.1253-1266, 2014.

H. Anne and . Ngu, IoT Middleware: A Survey on Issues and Enabling Technologies, IEEE Internet of Things Journal, vol.4, pp.1-20, 2017.

M. Nitti, A Subjective Model for Trustworthiness Evaluation in the Social Internet of Things, Proceedings of the 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp.18-23, 2012.

M. Nitti, Trustworthiness Management in the IoT: The Importance of the Feedback, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN, pp.325-327, 2017.

S. Noether, Ring SIgnature Confidential Transactions for Monero, IACR Cryptology ePrint Archive, vol.2015, p.1098, 2015.

A. Ouaddah, A. Abou-elkalam, and A. Ouahman, FairAccess: A New Blockchain-Based Access Control Framework for the Internet of Things, Security and Communication Networks, vol.9, issue.18, pp.5943-5964, 2016.

, Advancing Open Standards for the Information Society, 2018.

, OASIS. Service Component Architecture (SCA, 2018.

A. Outchakoucht, E. Hamza, and J. P. Leroy, Dynamic Access Control Policy Based on Blockchain and Machine Learning for the Internet of Things, International Journal of Advanced Computer Science and Applications, vol.8, issue.7, pp.417-424, 2017.

D. Ganapathi-padmavathi and . Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, 2009.

D. Parlanti, A Scalable Grid and Service-Oriented Middleware for Distributed Heterogeneous Data and System Integration in Context-Awareness-Oriented Domains, The Internet of Things, pp.109-118, 2010.

B. Parno, Pinocchio: Nearly Practical Verifiable Computation, Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP)

, IEEE, pp.238-252, 2013.

A. Pérez, Formal Description of the SWIFT Identity Management Framework, Future Generation Computer Systems, vol.27, issue.8, pp.1113-1123, 2011.

J. Pacheco and S. Hariri, IoT Security Framework for Smart Cyber Infrastructures, Proceedings of the 2016 IEEE International Workshops on Foundations and Applications of Self* Systems, pp.242-247, 2016.

, Privacy and Identity Management for Community Services, PICOS, 2007.

. Primelife, Privacy and Identity Management in Europe for Life, 2011.

. Mohammad-abdur-razzaque, Middleware for Internet of Things: A Survey, IEEE Internet of Things Journal, vol.3, issue.1, pp.70-95, 2016.

Y. Ren, Security in Mobile Wireless Sensor Networks a Survey, Journal of Communications, vol.6, issue.2, pp.128-142, 2011.

R. Roman, J. Lopez, and P. Najera, A Cross-Layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures, Wireless Communications and Mobile Computing, vol.11, issue.2, pp.267-276, 2011.

A. Rowe, Sensor Andrew: Large-Scale Campus-Wide Sensing and Actuation, IBM Journal of Research and Development, vol.55, issue.1, pp.6-7, 2011.

D. Recordon and D. Reed, OpenID 2.0: A Platform for User-Centric Identity Management, Proceedings of the Second ACM Workshop on Digital Identity Management, pp.11-16, 2006.

. Rsaconference and . Medjack, New Research on Attacks on Hospital Medical Devices | USA 2017 | RSA Conference, vol.3, 2017.

R. Roman, J. Zhou, and J. Lopez, On the Features and Challenges of Security and Privacy in Distributed Internet of Things, Computer Networks, vol.57, issue.10, pp.1389-1286, 2013.

. Samsung, IoT Cloud Platform -Samsung ARTIK Cloud Services, 2018.

R. S. Sandhu, Role-Based Access Control Models, Computer, vol.29, issue.2, pp.38-47, 1996.

. Sans-institute, Securing the Internet of Things Survey, p.10, 2014.

C. Sarkar, DIAT: A Scalable Distributed Architecture for IoT, IEEE Internet of Things Journal, vol.2, issue.3, pp.230-239, 2015.

E. Ben-sasson, Zerocash: Decentralized Anonymous Payments from Bitcoin, IEEE Symposium on Security and Privacy (SP), pp.459-474, 2014.

A. Serbanati, Concept and Solutions for Privacy and Security in the Resolution Infrastructure, Project Report D, vol.4, 2013.

S. Suriadi, E. Foo, and A. Jøsang, A User-Centric Federated Single Sign-on System, Journal of Network and Computer Applications, vol.32, issue.2, pp.388-401, 2009.

. Shocard, Secure Enterprise Identity Authentication, 2018.

S. Sicari, Security, Privacy and Trust in Internet of Things: The Road Ahead, Computer Networks, vol.76, pp.146-164, 2015.

S. Sicari, A Secure and Quality-Aware Prototypical Architecture for the Internet of Things, Information Systems, vol.58, pp.43-55, 2016.

. Sitewhere, The Open Platform for the Internet of Things, 2015.

. Sovrin, Identity For All, 2018.

P. Sethi, R. Smruti, and . Sarangi, Internet of Things: Architectures, Protocols, and Applications, Journal of Electrical and Computer Engineering, vol.2017, 2017.

, Secure idenTity acrOss boRders linKed 2.0, 2008.

A. Subash, IoTivity-Connecting Things in IoT, TIZEN Development Summit, 2015.

H. Suo, Security in the Internet of Things: A Review, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol.3, pp.648-651, 2012.

J. Swetina, Toward a Standardized Common M2M Service Layer Platform: Introduction to oneM2M, IEEE Wireless Communications, vol.21, issue.3, pp.20-26, 2014.

. Telit and . Telit, IoT Solutions Provider -Modules, IoT Platforms & IoT Connectivity, 2018.

O. Tomanek and L. Kencl, Security and Privacy of Using AllJoyn IoT Framework at Home and Beyond, Proceedings of the 2016 2nd International Conference on Intelligent Green Building and Smart Grid (IGBSG)

, IEEE, pp.1-6, 2016.

J. Torres, M. Nogueira, and G. Pujolle, A Survey on Identity Management for the Future Network, IEEE Communications Surveys & Tutorials, vol.15, issue.2, pp.787-802, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01168795

. Ubidots, Ubidots IoT Platform, 2018.

. Uport, Open Identity System for the Decentralized Web, 2018.

C. Vallati, Betaas: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things, Wireless Personal Communications, vol.87, issue.3, pp.1071-1091, 2016.

E. Vasilomanolakis, On the Security and Privacy of Internet of Things Architectures and Systems, International Workshop On, pp.49-57, 2015.

P. Vlacheas, Enabling Smart Cities through a Cognitive Management Framework for the Internet of Things, IEEE Communications Magazine, vol.51, issue.6, pp.102-111, 2013.

R. Valerdi, A. M. Ross, and D. H. Rhodes, A Framework for Evolving System of Systems Engineering, CrossTalk, 2007.

, W3C. World Wide Web Consortium, 2018.

, 5 -Framework, W3C. Web Services Policy, vol.1, 2007.

Z. Wang, Multi-Agent Control System with Information Fusion Based Comfort Model for Smart Buildings, Applied Energy, vol.99, pp.247-254, 2012.

W. River, Security in the Internet of Things: Lessons from the Past for the Connected Future, 2015.

G. Wood, Ethereum: A Secure Decentralised Generalised Transaction Ledger, p.39, 2014.

, The Open Source Technology for Digital Business, 2018.

Y. Wang and Q. Wen, A Privacy Enhanced Dns Scheme for the Internet of Things, 2011.

. Xively, IoT Platform for Connected Devices -Xively, 2018.

S. Yi, Fog Computing: Platform and Applications, Proceedings of the 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pp.73-78, 2015.

J. Yun, A Device Software Platform for Consumer Electronics Based on the Internet of Things, IEEE Transactions on Consumer Electronics, vol.61, issue.4, pp.564-571, 2015.

X. Zhu and Y. Badr, Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks, IEEE Symposium on Blockchain, pp.1361-1366, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01873093

X. Zhu, Practical PID Controller Implementation and the Theory Behind, Proceedings of the 2009 Second International Conference on Intelligent Networks and Intelligent Systems, pp.58-61, 2009.

. Zooko, . Zooko's-triangle, and . Wikipedia, Page Version ID: 846796887, 2018.

J. Zhang and V. Varadharajan, Wireless Sensor Network Key Management Survey and Taxonomy, Journal of Network and Computer Applications, vol.33, issue.2, pp.63-75, 2010.

.. .. Dhke-diffie-hellman-key-exchange, , vol.90, p.124

. .. Dos-denial-of-service, , vol.2, p.95

. Dtls-datagram-transport-layer and . .. Security, , vol.30, p.31

. .. Gui-graphical-user-interface, , vol.109, p.115

. .. Idm-identity-management, , vol.76, p.95

. .. Idp-identity-provider, , vol.6, p.114

.. .. Jwt-json-web-token,

. .. Mqtt-message-queuing-telemetry-transport, , vol.21, p.111

. .. Os-operating-systems,

. .. P2p-peer-to-peer, , vol.24, p.155

.. .. Qos-quality-of-service,

, REST REpresentational State Transfer, vol.14, p.137

. Scada-supervisory-control and . .. Data-acquisition, 33 SOA Service Oriented Architecture 14-16, vol.20, pp.53-57

M. Potop-butucaru, P. Des-universités, U. Rapporteure, D. Khalil, D. De-recherche et al., Laboratoire (s) de recherche : LIRIS Directeur de thèse: Youakim BADR Président de jury : Composition du jury