K. A. Agha, M. H. Bertin, T. Dang, A. Guitton, P. Minet et al., Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology, IEEE Transactions on Industrial Electronics, vol.56, issue.10, pp.4266-4278, 2009.
DOI : 10.1109/TIE.2009.2027253

. Atmel, Zigbee pro pack and analysis with sniffer, In: Application note, 2013.

R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati et al., Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1-7, 2012.
DOI : 10.1109/WoWMoM.2012.6263790

J. C. Chen and Y. P. Wang, Extensible authentication protocol (eap) and ieee 802.1x: tutorial and empirical experience, pp.26-32, 2005.

T. Dang and C. Devic, OCARI: Optimization of communication for Ad hoc reliable industrial networks, Industrial Informatics 6th IEEE International Conference on, pp.688-693, 2008.

T. Dierks, The transport layer security (TLS) protocol version 1, 2008.
DOI : 10.17487/rfc4346

T. W. Foundation, Wireshark 2.0.3 and 1.12.11 Released, 2016.

M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni, and P. Minet, MAC sub-layer node authentication in OCARI, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp.1-6, 2016.
DOI : 10.1109/PEMWN.2016.7842906

URL : https://hal.archives-ouvertes.fr/hal-01417671

M. 'raihi, D. Bellare, M. Hoornaert, F. Naccache, D. Ranen et al., HOTP: An HMAC-based one-time password algorithm, IETF, 2005.