M. M. Abdel-aziz and A. T. Abdel-hamid, Hardware low power implementation of attribute-based encryption, 28th International Conference on Microelectronics (ICM), pp.273-276, 2016.

R. Acker and M. Massoth, Secure ubiquitous house and facility control solution, 2010 Fifth International Conference on Internet and Web Applications and Services, pp.262-267, 2010.

M. T. Ahammed and P. P. Banik, Home appliances control using mobile phone, 2015 International Conference on Advances in Electrical Engineering (ICAEE), pp.251-254, 2015.

A. Ahmed and E. Ahmed, A survey on mobile edge computing, 10th International Conference on Intelligent Systems and Control (ISCO), pp.1-8, 2016.

A. Al-fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, Internet of things : A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015.

S. Alanazi, J. Al-muhtadi, A. Derhab, K. Saleem, A. N. Alromi et al., On resilience of wireless mesh routing protocol against dos attacks in iot-based ambient assisted living applications, 17th International Conference on E-health Networking, pp.205-210, 2015.

A. Alcaide, E. Palomar, J. Montero-castillo, and A. Ribagorda, Anonymous authentication for privacy-preserving iot target-driven applications, Computers & Security, vol.37, pp.111-123, 2013.

M. Ali, J. C. Nelson, R. Shea, and M. J. Freedman, Blockstack : A global naming and storage system secured by blockchains, USENIX Annual Technical Conference, pp.181-194, 2016.

M. Ambrosin, M. Conti, and T. Dargahi, On the feasibility of attributebased encryption on smartphone devices, Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp.49-54, 2015.

M. Atzori, Blockchain-based architectures for the internet of things : A survey, 2017.

A. Aydeger, N. Saputro, K. Akkaya, and M. Rahman, Mitigating crossfire attacks using sdn-based moving target defense, 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.627-630, 2016.

A. Bahga and V. K. Madisetti, Blockchain platform for industrial internet of things, Journal of Software Engineering and Applications, vol.9, issue.10, p.533, 2016.

D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, Talking to strangers : Authentication in ad-hoc wireless networks, NDSS. Citeseer, 2002.

F. Bao, R. Chen, M. Chang, and J. Cho, Hierarchical trust management for wireless sensor networks and its applications to trustbased routing and intrusion detection, IEEE Trans. on network and service management, vol.9, issue.2, pp.169-183, 2012.

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attributebased encryption, IEEE Symposium on Security and Privacy, 2007. SP'07, pp.321-334, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01788815

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attributebased encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01788815

K. Biswas and V. Muthukkumarasamy, Securing smart cities using blockchain technology, IEEE 18th International Conference on High References, p.117, 2016.

, Performance Computing and Communications, IEEE 14th International Conference on Smart City ; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp.1392-1393, 2016.

R. Blom, An optimal class of symmetric key generation systems, Workshop on the Theory and Application of of Cryptographic Techniques, pp.335-338, 1984.

D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, Annual International Cryptology Conference, pp.213-229, 2001.

F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp.13-16, 2012.

S. Bouzefrane, A. F. Mostefa, F. Houacine, and H. Cagnon, Cloudlets authentication in nfc-based mobile computing, 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp.267-272, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01126390

S. Brief, Sdn security considerations in the data center, 2013.

P. J. Bruening and K. K. Waterman, Data tagging for new information governance models, IEEE Security Privacy, vol.8, issue.5, pp.64-68, 2010.

E. Buchman, Tendermint : Byzantine fault tolerance in the age of blockchains, 2016.

P. Bull, R. Austin, E. Popov, M. Sharma, and R. Watson, Flow based security for iot devices using an sdn gateway, IEEE 4th International Conference on Future Internet of Things and Cloud Future Internet of Things and Cloud (FiCloud), pp.157-163, 2016.

C. Cachin and M. Vukoli?, Blockchain consensus protocols in the wild, 2017.

A. A. Cárdenas, S. Amin, and S. Sastry, Research challenges for the security of control systems, HotSec, 2008.

M. Castro and B. Liskov, Practical byzantine fault tolerance, OSDI, vol.99, pp.173-186, 1999.

H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, Proceedings. 2003 Symposium on Security and Privacy, pp.197-213, 2003.

I. Chatzigiannakis, A. Pyrgelis, P. G. Spirakis, and Y. C. Stamatiou, Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices, 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp.715-720, 2011.

D. Chen, G. Chang, D. Sun, J. Li, J. Jia et al., Trm-iot : A trust management model based on fuzzy reputation for internet of things, Comput. Sci. Inf. Syst, vol.8, issue.4, pp.1207-1228, 2011.

I. R. Chen, F. Bao, M. Chang, and J. H. Cho, Trust management for encounter-based routing in delay tolerant networks, IEEE Global Telecommunications Conf. GLOBECOM, pp.1-6, 2010.

I. R. Chen, F. Bao, and J. Guo, Trust-based service management for social internet of things systems, IEEE Trans. on Dependable and Secure Computing, vol.13, issue.6, pp.684-696, 2016.

M. Chen, Y. Hao, Y. Li, C. Lai, and D. Wu, On the computation offloading at ad hoc cloudlet : architecture and service modes, IEEE Communications Magazine, vol.53, issue.6, pp.18-24, 2015.

R. Chen, J. Guo, and F. Bao, Trust management for soa-based iot and its application to service composition, IEEE Trans. on Services Computing, vol.9, issue.3, pp.482-495, 2016.

W. Chen, An ibe-based security scheme on internet of things, Cloud Computing and Intelligent Systems (CCIS), vol.3, pp.1046-1049, 2012.

J. Cho, A. Swami, and R. Chen, Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks, Int. Conf. on Computational Science and Engineering, vol.2, pp.641-650, 2009.

T. Choi, H. B. Acharya, and M. G. Gouda, The best keying protocol for sensor networks, Pervasive and Mobile Computing, vol.9, issue.4, pp.564-571, 2013.

K. Christidis and M. Devetsikiotis, Blockchains and smart contracts for the internet of things, IEEE Access, vol.4, pp.2292-2303, 2016.

K. Christidis and M. Devetsikiotis, Blockchains and smart contracts for the internet of things, vol.4, pp.2292-2303, 2016.

C. Cocks, An identity based encryption scheme based on quadratic residues, IMA International Conference on Cryptography and Coding, pp.360-363, 2001.

B. Cohen, Incentives build robustness in bittorrent, Workshop on Economics of Peer-to-Peer systems, vol.6, pp.68-72, 2003.

M. Conoscenti, A. Vetrò, and J. C. De-martin, Blockchain for the internet of things : a systematic literature review, pp.1-6, 2016.

B. Cusack, Z. Tian, and A. K. Kyaw, Identifying dos and ddos attack origin : Ip traceback methods comparison and evaluation for iot, International Conference on Interoperability in IoT, pp.127-138, 2016.

F. Dalipi and S. Y. Yayilgan, Security and privacy considerations for iot application on smart grids : Survey and research challenges, IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp.63-68, 2016.

S. R. Das, S. Chita, N. Peterson, B. A. Shirazi, and M. Bhadkamkar, Home automation and security for mobile devices, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.141-146, 2011.

A. V. Dastjerdi and R. Buyya, Fog computing : Helping the internet of things realize its potential, Computer, vol.49, issue.8, pp.112-116, 2016.

F. M. De-almeida, A. Ribeiro, E. D. Moreno, and C. A. Montesco, Performance evaluation of an artificial neural network References multilayer perceptron with limited weights for detecting denial of service attack on internet of things. training, vol.11, p.12

H. T. Dinh, C. Lee, D. Niyato, and P. Wang, A survey of mobile cloud computing : architecture, applications, and approaches, Wireless communications and mobile computing, vol.13, issue.18, pp.1587-1611, 2013.

W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on dependable and secure computing, vol.3, issue.1, pp.62-77, 2006.

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security, pp.41-47, 2002.

D. Evans and D. M. Eyers, Efficient data tagging for managing privacy in the internet of things, 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp.244-248, 2012.

O. Flauzac, C. Gonzã¡lez, A. Hachani, and F. Nolot, Sdn based architecture for iot and improvement of the security, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp.688-693, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02514869

K. Gaurav, P. Goyal, V. Agrawal, and S. L. Rao, Iot transaction security, 5th International Conference on the Internet of Things (IoT), 2015.

M. Gerla, E. K. Lee, G. Pau, and U. Lee, Internet of vehicles : From intelligent grid to autonomous cars and vehicular clouds, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.241-246, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01215589

O. Ghabar and J. Lu, Remote control and monitoring of smart home facilities via smartphone with wi-fly, IARIA, 2015.

C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, Sdnbased security framework for the iot in distributed grid, International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp.1-5, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02430327

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security, pp.89-98, 2006.

J. Granjal, E. Monteiro, and J. S. Silva, Security for the internet of things : a survey of existing protocols and open research issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015.

F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, Cp-abe with constant-size keys for lightweight devices, IEEE transactions on information forensics and security, vol.9, issue.5, pp.763-771, 2014.

J. Guo, I. R. Chen, and J. J. Tsai, A mobile cloud hierarchical trust management protocol for iot systems, 5th IEEE Int. Conf. on Mobile Cloud Computing, Services, and Engineering, pp.125-130, 2017.

J. Guo, R. Chen, and J. J. Tsai, A survey of trust computation models for service management in internet of things systems, Computer Communications, vol.97, pp.1-14, 2017.

L. Guo, C. Zhang, and Y. Fang, A trust-based privacy-preserving friend recommendation scheme for online social networks, IEEE Trans. on Dependable and Secure Computing, vol.12, issue.4, pp.413-427, 2015.

S. Gusmeroli, S. Piccione, and D. Rotondi, A capability-based security approach to manage access control in the internet of things, Mathematical and Computer Modelling, vol.58, issue.5, pp.1189-1205, 2013.

T. Hardjono and N. Smith, Cloud-based commissioning of constrained devices using permissioned blockchains, Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp.29-36, 2016.

S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, World of empowered iot users, IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp.13-24, 2016.

D. He, J. Bu, S. Zhu, S. Chan, and C. Chen, Distributed access control with privacy support in wireless sensor networks, IEEE Transactions on Wireless Communications, vol.10, issue.10, pp.3472-3481, 2011.

P. Hu, A system architecture for software-defined industrial internet of things, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp.1-5, 2015.

P. Hu, S. Dhelim, H. Ning, and T. Qiu, Survey on fog computing : architecture, key technologies, applications and open issues, Journal of network and computer applications, vol.98, pp.27-42, 2017.

X. Huang, R. Fu, B. Chen, T. Zhang, and A. Roscoe, User interactive internet of things privacy preserved access control, 2012 International Conference for Internet Technology And Secured Transactions, pp.597-602, 2012.

R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh et al., 6lowpan fragmentation attacks and mitigation mechanisms, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.55-66, 2013.

W. Huo-wang and Z. Cheng, Parallel clustering-based k-anonymity algorithm in internet of things, Information Technology, vol.12, p.3, 2013.

M. H. Ibrahim, Octopus : An edge-fog mutual authentication scheme, IJ Network Security, vol.18, issue.6, pp.1089-1101, 2016.

Y. Imine, D. E. Kouicem, A. Bouabdallah, and L. Ahmed, Masfog : An efficient mutual authentication scheme for fog computing architecture, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering, pp.608-613, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01881628

U. Jayasinghe, N. B. Truong, G. M. Lee, and T. W. Um, Rpr : A trust computation model for social internet of things, Int. IEEE Conf. on Smart World Congress, pp.930-937, 2016.

, IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.600-607, 2013.

H. M. Kim and M. Laskowski, Towards an ontology-driven blockchain design for supply chain provenance, 2016.

B. Klugah-brown, J. B. Kanpogninge, and X. Qi, A signcryption scheme from certificateless to identity-based environment for wsns into iot, International Journal of Computer Applications, vol.120, issue.9, 2015.

L. Kokoris-kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly et al., Managing identities using blockchains and cosi, 9th Workshop on Hot Topics in Privacy Enhancing Technologies, 2016.

D. E. Kouicem, B. Abdelmadjid, and L. Hicham, Distributed fine-grained secure control of smart actuators in internet of things, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp.653-660, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01742408

D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, An efficient architecture for trust management in ioe based systems of systems, 13th Annual Conference on System of Systems Engineering (SoSE), pp.138-143, 2018.

D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, Internet of things security : A top-down survey, Computer Networks, vol.141, pp.199-221, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780365

D. E. Kouicem, Y. Imine, A. Bouabdallah, and H. Lakhlef, Decentralized trust management based blockchain protocol for internet of things, IEEE Transactions on dependable and secure Computing

Y. Lee, W. Lee, G. Shin, and K. Kim, Assessing the impact of dos attacks on iot gateway, 2016.

Y. Leng and L. Zhao, Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things, Proceedings of 2011 International Conference on Electronic Mechanical References Engineering and Information Technology, vol.6, pp.3190-3193, 2011.

F. Li, Y. Han, and C. Jin, Practical access control for sensor networks in the context of the internet of things, Computer Communications, vol.89, pp.154-164, 2016.

Z. Lin and L. Dong, Clarifying trust in social internet of things, 2017.

J. Liu, Y. Xiao, S. Li, W. Liang, and C. P. Chen, Cyber security and privacy issues in smart grids, IEEE Communications Surveys & Tutorials, vol.14, issue.4, pp.981-997, 2012.

A. , Namecoin. namecoin. info, 2014.

R. Lu, Z. Cao, Z. Chai, and X. Liang, A simple user authentication scheme for grid computing, IJ Network Security, vol.7, issue.2, pp.202-206, 2008.

Z. Lu, W. Liu, Q. Wang, G. Qu, and Z. Liu, A privacy-preserving trust model based on blockchain for vanets, IEEE Access, vol.6, pp.45655-45664, 2018.

C. Ma, K. Xue, and P. Hong, Distributed access control with adaptive privacy preserving property for wireless sensor networks, vol.7, pp.759-773, 2014.

P. Machaka, A. Mcdonald, F. Nelwamondo, and A. Bagula, Using the cumulative sum algorithm against distributed denial of service attacks in internet of things, International Conference on Context-Aware Systems and Applications, pp.62-72, 2015.

M. Mainelli and C. Von-gunten, Chain of a lifetime : How blockchain technology might transform personal insurance. Long Finance, 2014.

Y. Maleh, E. Abdellah, and M. Belaissaoui, Dos attacks analysis and improvement in dtls protocol for internet of things, ACM International conference on Big Data and Advanced Wireless technologies (BDAW'2016), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423691

L. Malina, J. Hajny, R. Fujdiak, and J. Hosek, On perspective of security and privacy-preserving solutions in the internet of things, Computer Networks, vol.102, pp.83-95, 2016.

K. Manoj, An enhanced remote user authentication scheme with smart card, International Journal of Network Security, vol.10, 2010.

T. Mantoro, M. A. Adnan, and M. A. Ayu, Secured communication between mobile devices and smart home appliances, 2013 International Conference on Advanced Computer Science Applications and Technologies, pp.429-434, 2013.

Y. Mao, J. Li, M. Chen, J. Liu, C. Xie et al., Fully secure fuzzy identity-based encryption for secure iot communications, Computer Standards & Interfaces, vol.44, pp.117-121, 2016.

X. Meng and D. Liu, Getrust : A guarantee-based trust model in chordbased p2p networks, IEEE Trans. on Dependable and Secure Computing, vol.15, issue.1, pp.54-68, 2018.

S. Müller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, International Conference on Information Security and Cryptology-ICISC 2008, vol.5461, pp.20-36, 2009.

S. Nakamoto, Bitcoin : A peer-to-peer electronic cash system, 2008.

C. V. Networking, Cisco global cloud index : Forecast and methodology, pp.2016-2021, 2016.

K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the internet of things, Ad Hoc Networks, vol.32, pp.17-31, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01272046

M. Nitti, R. Girau, and L. Atzori, Trustworthiness management in the social internet of things, IEEE Trans. on Knowledge and Data Engineering, vol.26, issue.5, pp.1253-1266, 2014.

B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, INFOCOM, pp.754-762, 2014.

H. Noura, Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations : Design, Analyze and Lessons Learned. HDR dissertation, 2016.

F. Olivier, G. Carlos, and N. Florent, Sdn based architecture for clustered wsn, 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.342-347, 2015.

D. Ongaro and J. Ousterhout, In search of an understandable consensus algorithm, {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), pp.305-319, 2014.

N. Oualha and K. T. Nguyen, Lightweight attribute-based encryption for the internet of things, 25th International Conference on Computer Communication and Networks (ICCCN), pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01841672

R. Panayappan, J. M. Trivedi, A. Studer, and A. Perrig, Vanet-based approach for parking space availability, Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp.75-76, 2007.

F. Pellarin, Communication method and device for remote control of an actuator for mobile equipment in a building, US Patent, vol.9, p.261, 2016.

A. Rghioui, A. Khannous, and M. Bouhorma, Denial-of-service attacks on 6lowpan-rpl networks : Threats and an intrusion detection system proposition, Journal of Advanced Computer Science & Technology, vol.3, issue.2, p.143, 2014.

S. S. Roby, Application of blockchain technology in online voting, 2017.

A. Sadeghi, C. Wachsmann, and M. Waidner, Security and privacy challenges in industrial internet of things, 52nd ACM/EDAC/IEEE on Design Automation Conference (DAC), p.1, 2015.

, References, vol.127, 2015.

A. Sahai and B. Waters, Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.457-473, 2005.

S. Sahraoui and A. Bilami, Efficient hip-based approach to ensure lightweight end-to-end security in the internet of things, Computer Networks, vol.91, pp.26-45, 2015.

Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Trust management system design for the internet of things : A context-aware and multi-service approach, Computers & Security, vol.39, pp.351-365, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01281972

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

D. Shreenivas, S. Raza, and T. Voigt, Intrusion detection in the rpl-connected 6lowpan networks, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp.31-38, 2017.

S. Sicari, A. Rizzardi, L. Grieco, G. Piro, and A. Coen-porisini, A policy enforcement framework for internet of things applications in the smart health, 2017.

S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and A. Coen-porisini, Security policy enforcement for networked smart objects, Computer Networks, vol.108, pp.133-147, 2016.

S. Sicari, A. Rizzardi, D. Miorandi, and A. Coen-porisini, Internet of things : Security in the keys, Q2SWinet MSWiM, pp.129-133, 2016.

A. F. Skarmeta, J. L. Hernandez-ramos, and M. V. Moreno, A decentralized approach for security and privacy challenges in the internet of things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.67-72, 2014.

I. Stojmenovic and S. Wen, The fog computing paradigm : Scenarios and security issues, Federated Conference on Computer Science and Information Systems, pp.1-8, 2014.

I. Stojmenovic and S. Wen, The fog computing paradigm : Scenarios and security issues, Federated Conference on Computer Science and Information Systems, pp.1-8, 2014.

J. Su, D. Cao, B. Zhao, X. Wang, and I. You, epass : An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things, Future Generation Computer Systems, vol.33, pp.11-18, 2014.

Z. Su, L. Liu, M. Li, X. Fan, and Y. Zhou, Servicetrust : Trust management in service provision networks, IEEE Int. Conf. on Services Computing, pp.272-279, 2013.

L. Sweeney, k-anonymity : A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.

T. Team, Avispa v1. 1 user manual. Information Society Technologies Programme, 2006.

D. Thatmann, S. Zickau, A. Förster, and A. Küpper, Applying attribute-based encryption on publish subscribe messaging patterns for the internet of things, 2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS), pp.556-563, 2015.

S. Tonyali, O. Cakmak, K. Akkaya, M. M. Mahmoud, and I. Guvenc, Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid ami networks, IEEE Internet of Things Journal, vol.3, issue.5, pp.709-719, 2016.

L. Touati, Y. Challal, and A. Bouabdallah, C-cp-abe : Cooperative ciphertext policy attribute-based encryption for the internet of things, 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp.64-69, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01060169

C. Vandana, Security improvement in iot based on software defined networking (sdn), International Journal of Engineering and Technology Research (IJSETR), vol.5, issue.1, pp.291-295, 2016.

P. Varshney and Y. Simmhan, Demystifying fog computing : Characterizing architectures, applications and abstractions, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp.115-124, 2017.

S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang et al., A survey on mobile edge networks : Convergence of computing, caching and communications, IEEE Access, vol.5, pp.6757-6779, 2017.

Z. Wang, H. Ding, J. Han, and J. Zhao, Secure and efficient control transfer for iot devices, International Journal of Distributed Sensor Networks, vol.9, issue.11, p.503404, 2013.

S. Wilkinson, T. Boshevski, J. Brandoff, and V. Buterin, Storj a peerto-peer cloud storage network, 2014.

Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. Leung, Blockchain-based decentralized trust management in vehicular networks, IEEE Internet of Things Journal, 2018.

X. Yao, Z. Chen, and Y. Tian, A lightweight attribute-based encryption scheme for the internet of things, Future Generation Computer Systems, vol.49, pp.104-112, 2015.

S. Yu, K. Ren, and W. Lou, Fdac : Toward fine-grained distributed data access control in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.4, pp.673-686, 2011.

X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, Healthcare data gateways : found healthcare intelligence on blockchain with novel privacy risk control, Journal of medical systems, vol.40, issue.10, p.218, 2016.

A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, Internet of things for smart cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014.

H. Zhang, Y. Xiao, S. Bu, D. Niyato, R. Yu et al., Fog computing in multi-tier data center networks : A hierarchical game approach, 2016 IEEE international conference on communications (ICC), pp.1-6, 2016.

R. Zhang, Y. Zhang, and K. Ren, Distributed privacy-preserving access control in sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1427-1438, 2012.

S. Zhu, S. Setia, and S. Jajodia, Leap+ : Efficient security mechanisms for large-scale distributed sensor networks, ACM Trans. Sen. Netw, vol.2, issue.4, pp.500-528, 2006.

S. ?ó?kiewski and K. Galuszka, Remote control of industry robots using mobile devices, New Contributions in Information Systems and Technologies, pp.323-332, 2015.