P. Mark and . Mills, The Cloud Begins with Coal, 2013.

, 3GPP. Proximity-based Services (ProSe, 2017.

, Service requirements for Machine-Type Communications, 3GPP, 2017.

, Most powerful millimeter-scale energy harvester generates electricity from vibrations, 2011.

R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction, 2018.

J. Arkko, E. Carrara, and F. Lindholm, Karl Norrman, and Mats Naslund. MIKEY: Multimedia Internet KEYing

N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, Analyzing the energy consumption of security protocols, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03, pp.30-35, 2003.

D. Singelée, S. Seys, L. Batina, and I. Verbauwhede, The Energy Budget for Wireless Security: Extended Version, IACR Cryptology ePrint Archive, p.1029, 2015.

A. Reziouk, E. Laurent, and J. Demay, Practical security overview of IEEE 802.15.4, 2016 International Conference on Engineering MIS (ICEMIS), pp.1-9, 2016.

M. Kim-thuat-nguyen, N. Laurent, and . Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol.32, pp.17-31, 2015.

A. Harsh and N. Ichalkaranje, Transforming e-Government to Smart Government: A South Australian Perspective, Intelligent Computing, Communication and Devices, pp.9-16

. Springer-india, , 2015.

D. De, Sensor Networks for Smart Environments, Journal of Telecommunications System & Management, vol.3, pp.1-2, 2014.

H. Schaffers, N. Komninos, M. Pallot, B. Trousse, M. Nilsson et al., Smart cities and the future internet: towards cooperation frameworks for open innovation, The Future Internet, pp.431-446, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00949037

R. R. Harmon, E. G. Castro-leon, and S. Bhide, Smart cities and the Internet of Things, 2015 Portland International Conference on Management of Engineering and Technology (PICMET), pp.485-494, 2015.

J. Sechang and M. , Feasibility Study on Disaster Management with Hybrid Network of LTE and Satellite Links. The Computing Research Repository, 2016.

A. Mahizhnan, Smart cities: The Singapore case, Cities, vol.16, issue.1, pp.13-18, 1999.

N. Odendaal, Information and communication technology and local governance: understanding the difference between cities in developed and emerging economies. Computers, Environment and Urban Systems, vol.27, pp.585-607, 2003.

L. M. Mcallister, H. M. Hall, H. L. Partridge, and G. C. Hallam, Effecting social change in the 'smart city': the West End connect community project, Social Change in the 21 st Century, pp.1-16, 2005.

C. Yin, Z. Xiong, H. Chen, J. Wang, D. Cooper et al., A literature survey on smart cities, Science China Information Sciences, vol.58, issue.10, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01267110

R. Giffinger, C. Fertner, and H. Kramar, Evert Meijers, Dipling Christian Fertner, Dipling Dr, and Hans Kramar. City-ranking of European Medium-Sized Cities, 2007.

J. Lee and H. Lee, Developing and validating a citizen-centric typology for smart city services, Government Information Quarterly, vol.31, pp.93-105, 2014.

A. Moreno-gomez, C. A. Perez-ramirez, A. Dominguez-gonzalez, M. Valtierra-rodriguez, O. Chavez-alegria et al., Sensors Used in Structural Health Monitoring, Archives of Computational Methods in Engineering, vol.25, issue.4, pp.901-918, 2018.

M. Vu?ini?, B. Tourancheau, F. Rousseau, A. Duda, L. Damon et al., Energy cost of security in an energy-harvested IEEE 802.15.4 Wireless Sensor Network, 3rd Mediterranean Conference on Embedded Computing (MECO), pp.198-201, 2014.

C. Filipe,

X. Wang, J. Zhang, E. M. Schooler, and M. Ion, Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT, 2014 IEEE International Conference on Communications (ICC), pp.725-730, 2014.

P. Trakadas, T. Zahariadis, H. C. Leligou, S. Voliotis, and K. Papadopoulos, Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks, 15th International Conference on Systems, Signals and Image Processing, pp.137-140, 2008.

C. Huth, R. Guillaume, P. Duplys, K. Velmurugan, and T. Güneysu, On the Energy Cost of Channel Based Key Agreement, Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED '16, pp.31-41, 2016.

X. Zhang, H. M. Heys, and C. Li, Energy cost of cryptographic session key establishment in a wireless sensor network, 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp.335-339, 2011.

P. Ilia, G. Oikonomou, and T. Tryfonas, Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks, vol.7886, pp.34-49
URL : https://hal.archives-ouvertes.fr/hal-01485932

H. Springer-berlin, , 2013.

G. De-meulenaer, F. Gosset, F. Standaert, and O. Pereira, On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.580-585, 2008.

, System improvements for Machine-Type Communications, 3GPP, 2012.

, Proximity-based services (ProSe), 3GPP, 2017.

M. N. Halgamuge, M. Zukerman, K. Ramamohanarao, and H. L. Vu, An Estimation of Sensor Energy Consumption, Progress In Electromagnetics Research, vol.12, pp.259-295, 2009.

H. Zhou, D. Luo, Y. Gao, and D. Zuo, Modeling of Node Energy Consumption for Wireless Sensor Networks, Wireless Sensor Network, vol.3, issue.1, pp.720-726, 2011.

J. Padgette, J. Bahr, M. Batra, M. Holtmann, R. Smithbey et al., Guide to Bluetooth Security. Special Publication (NIST SP) -800-121 Rev 2, 2017.

C. Filipe,

. Sig-working-group, , 2019.

W. K. Seah, Z. A. Eu, and H. Tan, Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) -Survey and challenges, 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, pp.1-5, 2009.

, A review on thermoelectric renewable energy: Principle parameters that affect their performance, Renewable and Sustainable Energy Reviews, vol.30, pp.337-355, 2014.

, Design and analysis of a thermoelectric energy harvesting system for powering sensing nodes in nuclear power plant -Semantic Scholar

S. Kundu, B. Harshal, and . Nemade, Modeling and Simulation of a Piezoelectric Vibration Energy Harvester, Procedia Engineering, vol.144, pp.568-575, 2016.

A. Erturk and D. J. Inman, Broadband piezoelectric power generation on highenergy orbits of the bistable Duffing oscillator with electromechanical coupling, Journal of Sound and Vibration, vol.330, issue.10, pp.2339-2353, 2011.

C. R. Valenta and G. D. Durgin, Harvesting Wireless Power: Survey of Energy-Harvester Conversion Efficiency in Far-Field, Wireless Power Transfer Systems, IEEE Microwave Magazine, vol.15, issue.4, pp.108-120, 2014.

A. Keranen, M. Ersue, and C. Bormann, Terminology for Constrained-Node Networks

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 2016.

F. Conceição, N. Oualha, and D. Zeghlache, An Energy Model for the IoT: Secure Networking Perspective, 2018.

Q. Wang, M. Hempstead, and W. Yang, A Realistic Power Consumption Model for Wireless Sensor Network Devices, 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol.1, pp.286-295, 2006.

, Modeling Energy Consumption of Wireless Sensor Networks by SystemC

G. Steri, G. Baldini, I. N. Fovino, R. Neisse, and L. Goratti, A novel multi-hop secure LTE-D2d communication protocol for IoT scenarios, 23rd International Conference on Telecommunications (ICT), pp.1-6, 2016.

C. Filipe,

A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev et al., Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity, IEEE Trustcom/BigDataSE/ISPA, vol.1, pp.826-833, 2015.

L. Caviglione, A. Merlo, and M. Migliardi, Green-Aware Security: Towards a new Research Field, p.10

L. Lazos and R. Poovendran, Energy-aware secure multicast communication in ad-hoc networks using geographic location information, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.4, p.201, 2003.

Y. Kim, S. Yoo, and C. Yoo, DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things, 2015 IEEE International Conference on Consumer Electronics (ICCE), pp.196-197, 2015.

T. Hayajneh, R. Doomun, G. Al-mashaqbeh, and B. J. Mohd, An energy-efficient and security aware route selection protocol for wireless sensor networks, vol.7, pp.2015-2038, 2014.

N. Nasser and Y. Chen, SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks, Computer Communications, vol.30, issue.11, pp.2401-2412, 2007.

, Energy Consumption of Cryptographic Algorithms in Mobile Devices

A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. D. Santis, Modeling energy-efficient secure communications in multi-mode wireless mobile devices, Journal of Computer and System Sciences, vol.81, issue.8, pp.1464-1478, 2015.

A. Castiglione, A. D. Santis, A. Castiglione, F. Palmieri, and U. Fiore, An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp.157-165, 2013.

J. Duan, D. Gao, D. Yang, C. H. Foh, and H. Chen, An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications, IEEE Internet of Things Journal, vol.1, issue.1, pp.58-69, 2014.

A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network, IEEE Sensors Journal, vol.15, issue.12, pp.6962-6972, 2015.

, Energy-efficient mechanisms in security of the internet of things: A survey

C. Filipe,

, Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks

K. Machado, D. Rosário, E. Cerqueira, A. F. Antonio, A. Loureiro et al., A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications, Sensors, vol.13, issue.2, pp.1942-1964, 2013.

, SCAVENGE-Sustainable Cellular Network Harvesting Ambient Energy. WP2-Energy Models, 2018.

B. Martinez, M. Montón, I. Vilajosana, and J. D. Prades, The Power of Models: Modeling Power Consumption for IoT Devices, IEEE Sensors Journal, vol.15, issue.10, pp.5777-5789, 2015.

W. Du, F. Mieyeville, and D. Navarro, Modeling Energy Consumption of Wireless Sensor Networks by SystemC, 2010 Fifth International Conference on Systems and Networks Communications, pp.94-98, 2010.

F. Conceicao, N. Oualha, and D. Zeghlache, Security establishment for IoT environments in 5g: Direct MTC-UE communications, IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp.1-5, 2017.
URL : https://hal.archives-ouvertes.fr/cea-01888850

N. Nikaein, M. Laner, K. Zhou, P. Svoboda, D. Drajic et al., Simple Traffic Modeling Framework for Machine Type Communication, ISWCS 2013; The Tenth International Symposium on Wireless Communication Systems, pp.1-5, 2013.

N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on Mobile Computing, vol.5, issue.2, pp.128-143, 2006.

M. Yoo, D. Bui-xuan-yen, and . Hop, Redundant Transmission in Wireless Networked Control System over IEEE 802.15.4e, Proceedings of the 2013 International Conference on Information Networking (ICOIN), ICOIN '13, pp.628-631, 2013.

, Cooperative effort based wireless sensor network clustering algorithm for smart home application

S. Yu, X. Wu, P. Wu, D. Wu, H. Dai et al., CIRF: Constructive interferencebased reliable flooding in asynchronous duty-cycle wireless sensor networks, 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp.2734-2738, 2014.

P. Jonsson and S. Carson, Ericsson Mobility Report. SectionStartPage, 2019.

C. Filipe,

A. Goldsmith, Cellular Systems and Infrastructure-Based Wireless Networks, 2005.

, Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements, 3GPP, 2016.

, The Keyed-Hash Message Authentication Code (HMAC), 2008.

M. Dworkin, Recommendation for block cipher modes of operation: the CMAC mode for authentication, 2016.

L. Chen, Recommendation for key derivation using pseudorandom functions (revised), 2009.

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.

C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks, 2013 IEEE Global Communications Conference (GLOBECOM), pp.832-837, 2013.

, 3GPP. Proximity-based Services

L. Caviglione, M. Gaggero, E. Cambiaso, and M. Aiello, Measuring the Energy Consumption of Cyber Security, IEEE Communications Magazine, vol.55, issue.7, pp.58-63, 2017.

J. Toldinas, R. Damasevicius, A. Venckauskas, T. Blazauskas, and J. Ceponis, Energy Consumption of Cryptographic Algorithms in Mobile Devices, Elektronika ir Elektrotechnika, vol.20, issue.5, pp.158-161, 2014.

, ICT Facts and Figures, 2017.

S. Cao and J. Li, A survey on ambient energy sources and harvesting methods for structural health monitoring applications, Advances in Mechanical Engineering, vol.9, issue.4, p.168781401769621, 2017.

C. Wei and X. Jing, A comprehensive review on vibration energy harvesting: Modelling and realization, Renewable and Sustainable Energy Reviews, vol.74, pp.1-18, 2017.

, How Long is the Lifetime of a Wireless Sensor Network, IEEE Conference Publication

C. Filipe,

, Zigbee Alliance. ZigBee Specification, 2012.

, IEEE 802.15.4-2015 -IEEE Standard for Low-Rate Wireless Networks, 2015.

A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices, ACM Comput. Surv, vol.48, issue.1, 2015.

M. Ahmed, A. Naser-mahmood, and J. Hu, A survey of network anomaly detection techniques, Journal of Network and Computer Applications, vol.60, pp.19-31, 2016.

M. Dworkin, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, 2007.

M. Dworkin, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Technical Report NIST Special Publication (SP), pp.800-838, 2001.

R. Vijay, J. N. Konda, and . Tsitsiklis, Actor-Critic Algorithms, p.7

, Mastering the game of Go without human knowledge | Nature

V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou et al., Playing Atari with Deep Reinforcement Learning, 2013.

R. S. Sutton, D. Mcallester, S. Singh, and Y. Mansour, Policy Gradient Methods for Reinforcement Learning with Function Approximation, Proceedings of the 12th International Conference on Neural Information Processing Systems, NIPS'99, pp.1057-1063, 1999.

P. Diederik, J. Kingma, and . Ba, Adam: A Method for Stochastic Optimization, 2014.

. Filipe,