I. Akyildiz and I. Kasimoglu, Wireless sensor and actor networks: research challenges, Ad hoc networks, vol.2, issue.4, pp.351-367, 2004.
DOI : 10.1016/j.adhoc.2004.04.003

A. Al-fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015.

L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.

A. Barros, M. Dumas, and A. Ter-hofstede, Service interaction patterns. Business Process Management, pp.302-318, 2005.

E. Bertino and N. Islam, Botnets and internet of things security, Computer, issue.2, pp.76-79, 2017.
DOI : 10.1109/mc.2017.62

H. Cai, B. Xu, L. Jiang, and A. V. Vasilakos, Iot-based big data storage systems in cloud computing: Perspectives and challenges, IEEE Internet of Things Journal, vol.4, issue.1, pp.75-87, 2017.
DOI : 10.1109/jiot.2016.2619369

S. Cherrier, Y. Ghamri-doudane, S. Lohier, and G. Roussel, Faultrecovery and coherence in web of things choreographies, WF-IoT, 2014.
DOI : 10.1109/wf-iot.2014.6803224

URL : https://hal-upec-upem.archives-ouvertes.fr/hal-00957056/file/Coherencev2.pdf

S. Cherrier, Y. Ghamri-doudane, S. Lohier, and G. Roussel, D-lite : Distributed logic for internet of things services, IEEE International Conferences Internet of Things, pp.16-24, 2011.
DOI : 10.1109/ithings/cpscom.2011.33

URL : https://hal.archives-ouvertes.fr/hal-00693377

S. Cherrier and Y. M. Ghamri-doudane, The "object-as-a-service" paradigm, Global Information Infrastructure and Networking Symposium (GIIS), pp.1-7, 2014.
DOI : 10.1109/giis.2014.6934281

URL : https://hal.archives-ouvertes.fr/hal-01058957

S. Cherrier, I. Salhi, Y. Ghamri-doudane, S. Lohier, and P. Valembois, Bec3: Behaviour crowd centric composition for iot applications. Mobile Networks and Applications, pp.1-15, 2013.
DOI : 10.1007/s11036-013-0481-8

URL : https://hal.archives-ouvertes.fr/hal-01378059

Z. Huang, X. Su, Y. Zhang, C. Shi, H. Zhang et al., A decentralized solution for iot data trusted exchange based-on blockchain, Computer and Communications (ICCC), 2017 3rd IEEE International Conference on, pp.1180-1184, 2017.
DOI : 10.1109/compcomm.2017.8322729

N. Kushalnagar, G. Montenegro, and C. Schumacher, Rfc 4919: Ipv6 over low-power wireless personal area networks (6lowpans): overview. Assumptions, Problem Statement, and Goals, 2007.
DOI : 10.17487/rfc4919

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4919.txt.pdf

Z. Shelby and C. Bormann, 6LoWPAN: The Wireless Embedded Internet, 2010.

Z. Shelby, B. Frank, and D. Sturek, Constrained application protocol (coap). An online version is, 2010.
DOI : 10.17487/rfc7252

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc7252.txt.pdf

N. Sklavos and I. D. Zaharakis, Cryptography and security in internet of things (iots): Models, schemes, and implementations, New Technologies, Mobility and Security (NTMS), pp.1-2, 2016.

S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato, A survey on network methodologies for real-time analytics of massive iot data and open research issues, IEEE Communications Surveys & Tutorials, vol.19, issue.3, pp.1457-1477, 2017.

S. Wunderlich, J. A. Cabrera, F. H. Fitzek, and M. Reisslein, Network coding in heterogeneous multicore iot nodes with dag scheduling of parallel matrix block operations, IEEE Internet of Things Journal, vol.4, issue.4, pp.917-933, 2017.

I. Yaqoob, E. Ahmed, I. A. Hashem, A. I. Ahmed, A. Gani et al., Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges, IEEE wireless communications, vol.24, issue.3, pp.10-16, 2017.
DOI : 10.1109/mwc.2017.1600421

J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, Security and privacy for cloud-based iot: challenges, IEEE Communications Magazine, vol.55, issue.1, pp.26-33, 2017.
DOI : 10.1109/mcom.2017.1600363cm