?. M. Kome, M. Graa, F. Cuppens, N. Cuppens-boulahia, and V. Frey, DIscovery and REgistration Protocol: For Device and Person Identity Management in, IoT -13th International Conference on Information Systems Security, 2017.

?. M. Kome, M. Graa, F. Cuppens, N. Cuppens-boulahia, and V. Frey, Detection and response to Data Exfiltration from Internet of Things Android Devices-24th IFIP World Computer Congress, 2018.

?. M. Kome, F. Cuppens, N. Cuppens-boulahia, and V. Frey, CoAP Enhancement For a Better IoT Centric Protocol: CoAP2.0. 5th International Conference on Internet of Things: Systems, Management and Security, 2018.

?. M. Kome, F. Cuppens, N. Cuppens-boulahia, and V. Frey, A certificateless key exchange protocol for IoT, The 13th International Conference on Risks and Security of Internet and Systems, p.28, 2008.

. Abrial, Rodin: an open toolset for modelling and reasoning in Event-B, vol.12, p.105, 2010.

, Authentication and authorization for constrained environments (ace), vol.40, p.51, 2017.

A. , Imperfect forward secrecy: How diffie-hellman fails in practice, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, vol.67, p.130, 2015.

R. G. and A. Banks, , p.97, 2001.

, Bonjour printing specification, vol.44, p.45, 2003.

S. M. Microsoft-corporationapple, Dynamic configuration of ipv4 link-local addresses, p.45, 2005.

[. Armando, The avispa tool for the automated validation of internet security protocols and applications, International conference on computer aided verification, p.29, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000408

. Bibliography-[arzt, Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Acm Sigplan Notices, vol.49, issue.6, p.79, 2014.

D. Balfanz, Fido u2f implementation considerations. FIDO Alliance Proposed Standard, p.14, 2015.

[. Barki, M2m security: Challenges and solutions, IEEE Communications Surveys & Tutorials, vol.18, issue.2, p.76, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01236511

A. Berni and W. Gregg, On the utility of chirp modulation for digital signaling, IEEE Transactions on Communications, vol.21, issue.6, pp.748-751, 1973.

[. Bhoyar, Comparative study on ieee, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), vol.2, issue.7, pp.687-691, 2013.

[. Bigioi, Digital imaging services using ptp (picture transfer protocol), Consumer Electronics, 2002. ICCE. 2002 Digest of Technical Papers. International Conference on, p.80, 2002.

S. Blake-wilson and A. Menezes, Authenticated diffe-hellman key agreement protocols, International Workshop on Selected Areas in Cryptography, p.75, 1998.

D. Boneh, The decision diffie-hellman problem, International Algorithmic Number Theory Symposium, p.66, 1998.

[. Bormann, Terminology for constrained-node networks, vol.43, p.65, 2014.

J. Bradley and W. Denniss, Oauth 2.0 for native apps, p.23, 2017.

. Bradley, An incremental development of the Mondex system in Event-B. Formal Aspects of Computing, vol.20, p.28, 2008.

A. Cavoukian, Privacy in the clouds, Identity in the Information Society, vol.1, issue.1, p.17, 2008.

I. Cervesato, The Dolev-Yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science LICS, vol.1, p.32, 2001.

[. Chen, Identity-based key agreement protocols from pairings, International Journal of Information Security, vol.6, issue.4, p.75, 2007.

, DNS-based service discovery, 2013.

[. Cirani, Iot-oas: an oauth-based authorization service architecture for secure services in iot scenarios, IEEE Sensors Journal, vol.15, issue.2, p.41, 2015.

, C. Community. C.h.i.p community, p.59, 2018.

C. Cox, An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile communications, 2012.

S. [de, State of the art of smart homes, Engineering Applications of Artificial Intelligence, vol.25, issue.7, pp.1313-1321, 2012.

P. Delsarte, Bilinear forms over a finite field, with applications to coding theory, Journal of Combinatorial Theory, Series A, vol.25, issue.3, p.67, 1978.

D. Evans, the internet of things":how the next evolution of the internet is changing everything, 2011.

W. Diffie and M. Hellman, New directions in cryptography. IEEE transactions on Information Theory, vol.22, p.65, 1976.

[. Do, Exfiltrating data from android devices, Computers & Security, vol.48, p.92, 2015.

. Bibliography-[d'orazio, Data exfiltration from internet of things devices: ios devices as case studies, IEEE Internet of Things Journal, vol.4, issue.2, p.92, 2017.

, Domain name system (dns) iana considerations, vol.46, p.53, 2013.

C. Ellison and B. Schneier, Ten risks of pki: What you're not being told about public key infrastructure, Comput Secur J, vol.16, issue.1, p.73, 2000.

[. Eloff, Internet of people, things and services-the convergence of security, trust and privacy, Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones, vol.32, p.92, 2009.

, Internet Engineering Task Force. Certificate credentials for ACE framework. Internet-Draft draft-erdtman-ace-certificate-credential-00, 2016.

, Espressif systems socs, p.75, 2014.

E. U. Eugster, P. A. Felber, R. Guerraoui, and A. , General data protection regulation, 2018.

M. Kermarrec, The many faces of publish/subscribe, ACM computing surveys (CSUR), vol.35, issue.2, p.46, 2003.

D. Evans, The internet of things: How the next evolution of the internet is changing everything, vol.1, pp.1-11, 2011.

. Flores, Ieee 802.11 af: A standard for tv white space spectrum sharing, IEEE Communications Magazine, vol.51, issue.10, pp.92-100, 2013.
URL : https://hal.archives-ouvertes.fr/hal-02184618

[. Fremantle, Federated identity and access management for the internet of things, Secure Internet of Things (SIoT, p.13, 2014.

, A bill of rights for the internet of things, p.17, 2013.

. Fuchs, Scandroid: Automated security certification of android, p.79, 2009.

J. H. , N. Kushalnagarg, and . Montenegro, Transmission of ipv6 packets over ieee 802.15.4 networks, 2007.

[. Gaedke, A modeling approach to federated identity and access management, Special interest tracks and posters of the 14th international conference on World Wide Web, p.13, 2005.

I. Galeev, ;. Gantz, and D. Reinsel, Catching the z-wave, The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView: IDC Analyze the future, pp.1-16, 2006.

D. George and . Micropython, , p.75, 2014.

. Gerdes, Delegated CoAP Authentication and Authorization Framework (DCAF), p.40, 2014.

. Gerdes, Internet Engineering Task Force. An architecture for authorization in constrained environments, 2016.

[. Gomez, Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology, Sensors, vol.12, issue.9, pp.11734-11753, 2012.

. Graa, Protection against code obfuscation attacks based on control dependencies in android systems, Software Security and Reliability-Companion (SERE-C), vol.45, p.79, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01010902

[. Graa, Detecting control flow in smarphones: Combining static and dynamic analyses, Cyberspace Safety and Security, p.92, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00785180

[. Graa, , 2016.

. Lanet, Tracking explicit and control flows in Java and native Android apps code, ICISSP 2016 : 2nd International Conference on Information Systems Security and Privacy, volume Proceedings of the 2nd International Conference on Information Systems Security and Privacy, vol.79, p.92, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01385196

[. Gubbi, Internet of things (iot): A vision, architectural elements, and future directions, Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services & Cloud Computing and Scientific Applications ?Äî Big Data, Scalable Analytics, and Beyond, vol.29, pp.1645-1660, 2013.

[. Gubbi, Internet of things (iot): A vision, architectural elements, and future directions, Future generation computer systems, vol.29, issue.7, p.79, 2013.

R. Gupta and M. R. Murty, Primitive points on elliptic curves, Compositio mathematica, vol.58, issue.1, p.66, 1986.

[. Gura, , 2004.

. Shantz, Comparing elliptic curve cryptography and rsa on 8-bit cpus, International workshop on cryptographic hardware and embedded systems, p.65, 2004.

[. Guri, Usbee: air-gap covertchannel via electromagnetic emission from usb, Privacy, Security and Trust (PST), 2016 14th Annual Conference on, p.92, 2016.

D. Hardt, The oauth 2.0 authorization framework, vol.10, p.51, 2012.

. Hornyack, , 2011.

. Wetherall, These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications, Proceedings of the 18th ACM conference on Computer and communications security, p.92, 2011.

. Housley, Internet x. 509 public key infrastructure certificate and crl profile, p.68, 1998.

C. Hsu, J. , and C. Lin, An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives, Computers in Human Behavior, vol.62, p.79, 2016.

S. T. Hunt, Cyber attack: hackers 'weaponised' everyday devices with malware. The Guardian, vol.21, p.102, 2016.

. Hwang, Bittersweet adb: Attacks and defenses, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, p.92, 2015.

, Itu strategy and policy unit (spu),the internet of things executive summary, 2005.

, Json web algorithms (jwa), p.81, 2015.

. Jones, Json web signature (jws), p.81, 2015.

. Jones, Json web encryption (jwe), JSON Web Token (JWT). RFC, vol.7519, p.85, 1980.

. Jones, CBOR Web Token (CWT), vol.8392, p.61, 2018.

I. C. Joye and G. Neven, Identity-based signatures, Identity-Based Cryptography, vol.2, p.75, 2009.

M. B. Kelley, The stuxnet attack on iran?Äôs nuclear plant was ?Äòfar more dangerous?Äô than previously thought, Business Insider, vol.20, p.76, 2013.

[. Khodadadi, Simurgh: A framework for effective discovery, programming, and integration of services exposed in IoT, Recent Advances in Internet of Things (RIoT), 2015 International Conference on, p.24, 2015.

. Bibliography-[khorov, A survey on ieee 802.11 ah: An enabling networking technology for smart cities, Computer Communications, vol.58, issue.4, pp.53-69, 2015.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), vol.29, p.87, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575923

N. I. Koblitz, Introduction to elliptic curves and modular forms, vol.97, p.66, 2012.

[. Kothmayr, , 2013.

. Carle, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, vol.11, issue.8, p.40, 2013.

H. Krawczyk, Hmqv: A high-performance secure diffie-hellman protocol, Annual International Cryptology Conference, p.75, 2005.

[. Lamparter, Mtp: a movie transmission protocol for multimedia applications, ACM SIGCOMM Computer Communication Review, vol.22, issue.3, p.81, 1992.

R. Langner, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy, vol.9, issue.3, p.69, 2011.

[. Lau, , 2013.

. Royal and . Mactans, Injecting malware into ios devices via malicious chargers, p.92, 2013.

[. Lenstra, The number field sieve, The development of the number field sieve, p.67, 1993.
URL : https://hal.archives-ouvertes.fr/inria-00108061

Z. Li and Q. Liang, Performance analysis of multiuser selection scheme in dynamic home area networks for smart grid communications, IEEE Transactions on Smart Grid, vol.4, issue.1, pp.13-20, 2013.

F. Liu and ;. Lueg, Pyrit code source. 2013. 73 [Lueg 2013b] L. Lueg. The twilight of wi-fi protected access, p.73, 2013.

[. Lugo-cordero, An adaptive cognition system for smart grids with context awareness and fault tolerance, IEEE Transactions on Smart Grid, vol.5, issue.3, pp.1246-1253, 2014.

[. Machani, Fido uaf review draft spec set. FIDO Alliance Proposed Standard, p.14, 2014.

J. R. and H. Machulak, Federated authorization for user-managed access (uma) 2.0, p.11, 2018.

J. R. and H. Machulak, User-managed access (uma) 2.0 grant for oauth 2.0 authorization, p.11, 2018.

[. Manyika, Disruptive technologies: Advances that will transform life, business, and the global economy, McKinsey Global Institute, vol.180, issue.6, 2013.

[. Matsumoto, On seeking smart public-key-distribution systems, IEICE TRANSACTIONS, vol.69, issue.2, p.75, 1976.

. Mendes, Smart home communication technologies and applications: Wireless protocol assessment for home area network resources, Energies, vol.8, issue.7, pp.7279-7311, 2015.

D. Migault, T. Guggemos, and C. Bormann, Esp header compression and diet-esp. Internet Engineering Task Force, p.76, 2004.

D. Migault, T. Guggemos, S. Killian, M. Laurent, G. Pujolle et al., Diet-esp: Ip layer security for iot, Journal of Computer Security, vol.25, issue.2, p.76, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01518274

V. S. Miller, Use of elliptic curves in cryptography, Conference on the theory and application of cryptographic techniques, p.66, 1985.

R. Muresan, Attacks on IoT devices more than doubled in 2015, study shows ?Äì HOTforSecurity, vol.21, p.102, 2016.

B. F. Murphy-;-c, G. Montenegron, and . Kushalnagar, Ipv6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, and goals, 2007.

. Nicanfar, Efficient authentication and key management mechanisms for smart grid communications, IEEE systems journal, vol.8, issue.2, p.75, 2014.

S. Nicolas, Power profiling: Https long polling vs. mqtt with ssl, on android, vol.25, p.46, 2012.

A. Nordrum, Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated, p.79, 2016.

K. Nyberg and R. A. , Message recovery for signature schemes based on the discrete logarithm problem, Workshop on the Theory and Application of of Cryptographic Techniques, p.65, 1994.

N. O'leary, Arduino Client for MQTT, p.35, 2009.

P. Palmila, Zeroconf and UPnP techniques, p.45, 2007.

M. A. Pedrasa, T. D. Spooner, and I. F. Macgill, Coordinated scheduling of residential distributed energy resources to optimize smart home energy services, CoAP Pub-Sub Profile for Authentication and Authorization for Constrained Environments (ACE), vol.50, pp.134-143, 2010.

S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. , the caffeinemark java performance test, p.91, 1997.

. Voigt, Lithe: Lightweight secure CoAP for the internet of things, IEEE Sensors Journal, vol.13, issue.10, p.61, 2013.

S. Raza, D. Trabalza, and T. Voigt, 6lowpan compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, vol.4, p.40, 2012.

S. Raza, D. Trabalza, and T. Voigt, 6lowpan compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, p.76, 2012.

N. Sakimura, J. Bradley, M. Jones, B. Medeiros, and C. Mortimore, Openid connect core 1.0 incorporating errata set 1. The OpenID Foundation, specification, p.70, 2014.

E. T. and D. Balfanzsampath-srinivas, Universal 2nd factor (u2f) overview, p.14, 2014.

, Use of the advanced encryption standard (aes) encryption algorithm in cryptographic message syntax (cms), 2003.

, J. Schaad. CBOR Object Signing and Encryption (COSE). RFC, vol.8152, p.61, 2017.

M. Scott, Authenticated id-based key exchange and remote log-in with simple token and pin number, IACR Cryptology ePrint Archive, p.75, 2002.

[. Sharma, Detecting data exfiltration by integrating information across layers, Information Reuse and Integration (IRI), p.92, 2013.

. Shelby, The Constrained Application Protocol (CoAP), vol.76, p.106, 2014.

K. Shim, Efficient id-based authenticated key agreement protocol based on weil pairing, Electronics Letters, vol.39, issue.8, p.75, 2003.

, Sigfox : Radio technology keypoints, 2012.

N. P. Smart, The discrete logarithm problem on elliptic curves of trace one, Journal of cryptology, vol.12, issue.3, p.65, 1999.

N. P. Smart, Identity-based authenticated key agreement protocol based on weil pairing, Electronics letters, vol.38, issue.13, p.75, 2002.

R. Spolaor, L. Abudahi, V. Moonsamy, M. Conti, and R. Poovendran, No free charge theorem: A covert channel via usb charging cable on mobile devices, International Conference on Applied Cryptography and Network Security, p.92, 2017.

S. Taylor, The next generation of the internet revolutionizing the way we work, live, play, and learn, vol.12, 2013.

. Thangavel, Performance evaluation of mqtt and coap via a common middleware, Intelligent Sensors, Sensor Networks and Information Processing, p.44, 2014.

, Fitbit users are unwittingly sharing details of their sex lives with the world, vol.22, p.102, 2013.

, The first $9 computer. 2016. 58 [Thuresson 2006] M. Thuresson. Z-wave, zigbee compete to become standard. NIKKEI ELECTRONICS ASIA, p.32, 2006.

. Tian, Defending against malicious usb firmware with goodusb, Proceedings of the 31st Annual Computer Security Applications Conference, p.92, 2015.

. Torres, A survey on identity management for the future network, IEEE Communications Surveys & Tutorials, vol.15, issue.2, p.95, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01168795

H. Tschofenig, The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant, p.40, 2014.

P. Urien and ;. Baushke, Three innovative directions based on secure elements for trusted and secured iot platforms, New Technologies, Mobility and Security (NTMS), p.65, 2016.

S. Viehböck, Brute forcing wi-fi protected setup. when poor design meets poor implementation, p.73, 2011.

[. Wang, Cryptanalysis and improvement of an elliptic curve diffie-hellman key agreement protocol, IEEE Communications Letters, vol.12, issue.2, p.75, 2008.

[. Wang, Exposing security risks for commercial mobile devices, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, p.92, 2012.

H. Yang, Flask-OAuthlib ?Äî Flask-OAuthlib 0.9.3 documentation, p.35, 2013.

. Zhang, Efficient energy consumption and operation management in a smart building with microgrid, Energy Conversion and Management, vol.74, issue.6, pp.209-222, 2013.

. Zhang, Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Trans. Smart Grid, vol.2, issue.4, pp.796-808, 2011.

. .. Oauth-abstract-flow,

C. Supplier, 35 2.6 Class diagram of the IS implementation

. .. , 47 3.2 Content-based Pub/Sub interactions, Topic-based Pub/Sub interactions

. .. Coap-message-format,

.. .. Piggybacked-response,

.. .. Separate-response,

. .. , A client registers and receives one notification of the current state and one of a new state upon a state change, p.51

, Basic access control use case in IoT

, A Client Registers and Receives Notifications of the Current State according to the Rule: 18 < State ? 22

]. .. , The Logjam attack on TLS, p.68

, A certification path from the certificate owner to the Root CA, p.69

. Brute and .. M4, M7 are messages exchanged during the WPA authentication with PIN

, Security model of the protocol, vol.87

, Android system device notifications

.. .. Schematics,

A. , Discovery and Registration protocol flow