M. Abrams and J. Weiss, Malicious control system cyber security attack case study?Maroochy Water Services, 2008.

T. Dierks, The transport layer security (TLS) protocol version 1.2, 2008.
DOI : 10.17487/rfc5246

J. Morris and . Dworkin, SP 800-38C. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, 2004.

M. J. Dworkin, SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, 2007.

M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni, and P. Minet, MAC sub-layer node authentication in OCARI, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp.1-6, 2016.
DOI : 10.1109/PEMWN.2016.7842906

URL : https://hal.archives-ouvertes.fr/hal-01417671

M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni, and P. Minet, A Lightweight Mutual Authentication Protocol for the IoT, 2017.
DOI : 10.1109/PEMWN.2016.7842906

R. Housley, W. Polk, W. Ford, and D. Solo, Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile, 2002.
DOI : 10.17487/rfc3280

T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, pp.2710-2723, 2013.
DOI : 10.1016/j.adhoc.2013.05.003

H. Krawczyk, R. Canetti, and M. Bellare, HMAC: Keyedhashing for message authentication, 1997.
DOI : 10.17487/rfc2104

URL : http://ietfreport.isoc.org/rfc/PDF/rfc2104.pdf

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997.
DOI : 10.1109/CSFW.1997.596782

F. Vidal-meca, H. Ziegeldorf, P. M. Sanchez, O. Garcia-morchon, S. Sandeep et al., HIP Security Architecture for the IP-Based Internet of Things, 2013 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1331-1336, 2013.
DOI : 10.1109/WAINA.2013.158

D. M-'raihi, . Bellare, . Hoornaert, O. Naccache, and . Ranen, HOTP: An HMAC-based one-time password algorithm. IETF, RFC 4226, 2005.

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

K. Freddy, . Santoso, C. Nicholas, and . Vun, Securing IoT for smart home system, Consumer Electronics (ISCE), 2015 IEEE International Symposium on, pp.1-2, 2015.