, Ieee standard for local and metropolitan area networks-part 15.6: Wireless body area networks, IEEE Std, vol.802, pp.1-271, 2012.

, Study on enhancements for Machine-Type Communications (MTC), 2012.

, 3GPP TS 22.368 V12.2.0. Service Requirements for Machine-Type Communications, 2013.

D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, Resilient overlay networks, SIGCOMM Comput. Commun. Rev, vol.32, issue.1, pp.66-66, 2002.

J. Arkko and I. Van-beijnum, Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming, RFC, vol.5534, 2009.

, Autonomic schemes for threat mitigation in internet of things, Journal of Network and Computer Applications, vol.49, issue.0, pp.112-127, 2015.

Q. M. Ashraf, M. H. Habaebi, G. R. Sinniah, M. M. Ahmed, S. Khan et al., Autonomic protocol and architecture for devices in internet of things, Innovative Smart Grid Technologies-Asia (ISGT Asia), pp.737-742, 2014.

S. Barré and O. Bonaventure, Improved path exploration in shim6-based multihoming, SIGCOMM 2007 Workshop "IPv6 and the Future of the Internet, 2007.

L. Bokor, S. Nováczki, G. László-tamás-zeke, and . Jeney, Design and evaluation of host identity protocol (hip) simulation framework for inet/omnet++, Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM '09, pp.124-133, 2009.

V. Cerf, The catenet model for internetworking. IEN, 1978.

Y. Inhyok-cha, A. U. Shah, A. Schmidt, M. V. Leicher, and . Meyerstein, Trust in m2m communication. Vehicular Technology Magazine, IEEE, vol.4, issue.3, pp.69-75, 2009.

Y. Choi, I. Doh, S. Park, and K. Chae, Security based semantic context awareness system for m2m ubiquitous healthcare service, Ubiquitous Information Technologies and Applications, vol.214, pp.187-196, 2013.

A. Dhraief, M. A. Ghorbali, T. Bouali, and A. Belghith, Mobility management in the hip-based m2m overlay network, Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp.50-55, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01539445

A. Dhraief, M. A. Ghorbali, T. Bouali, A. Belghith, and K. Drira, Simultaneous mobility management in the hip-based m2m overlay network, Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, pp.219-224, 2013.

A. Dhraief and A. Belghith, Multihoming support in the internet: A state of the art, International Conference on Models of Information and Communication Systems (MICS 2010), 2010.

A. Dhraief and A. Belghith, An experimental investigation of the impact of mobile ipv6 handover on transport protocols. The Smart Computing Revue, KAIS, vol.2, issue.1, 2012.

A. Dhraief, M. A. Ghorbali, and T. Bouali, Abdelfettah Belghith, and Khalil Drira, The 2012 Third International Conference on the Network of the Future, 2012.

A. Dhraief, . Issam, A. Mabrouki, and . Belghith, A serviceoriented framework for mobility and multihoming support, Electrotechnical Conference (MELECON), 2012 16th IEEE Mediterranean, pp.489-493, 2012.

A. Dhraief and N. Montavont, Rehoming decision algorithm: Design and empirical evaluation, Proceedings of the 2009 International Conference on Computational Science and Engineering, vol.02, pp.464-469, 2009.
DOI : 10.1109/cse.2009.422

A. Dhraief, T. Ropitault, and N. Montavont, Mobility and multihoming management and strategies. In IFIP, editor, 14th Eunice Open European Summer School, 2008.

, ETSI TS 102 689 V2.1.1. Machine-to-Machine communications (M2M)

, M2M service requirements, 2013.

, ETSI TS 102 690 V1.2.1. Machine-to-Machine communications (M2M); Functional architecture, 2013.

Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki et al., Toward intelligent machine-to-machine communications in smart grid, Communications Magazine, vol.49, issue.4, pp.60-65, 2011.

S. Fu, M. Atiquzzaman, L. Ma, and Y. Lee, Signaling cost and performance of sigma: A seamless handover scheme for data networks, Wireless Communications and Mobile Computing, vol.5, issue.7, pp.825-845, 2005.

A. G. Ganek and T. A. Corbi, The dawning of the autonomic computing era, IBM Systems Journal, vol.42, issue.1, pp.5-18, 2003.

G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, M2M: From mobile to embedded internet, Communications Magazine, vol.49, issue.4, pp.36-43, 2011.

J. Granjal, E. Monteiro, and J. Silva, Security issues and approaches on wireless m2m systems, Wireless Networks and Security, Signals and Communication Technology, pp.133-164, 2013.
DOI : 10.1007/978-3-642-36169-2_5

Q. He, J. Yan, Y. Yang, R. Kowalczyk, and H. Jin, A decentralized service discovery approach on peer-to-peer networks. Services Computing, IEEE Transactions on, vol.6, issue.1, pp.64-75, 2013.

T. R. Henderson, J. M. Ahrenholz, and J. H. Kim, Experience with the host identity protocol for secure host mobility and multihoming, IEEE Wireless Communications and Networking, vol.3, pp.2120-2125, 2003.

R. Jain, Internet 3.0: Ten problems with current internet architecture and solutions for the next generation, Military Communications Conference, 2006. MILCOM 2006. IEEE, pp.1-9, 2006.

J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, J. W. O'toole et al., Overcast: reliable multicasting with on overlay network, Proceedings of the 4th conference on Symposium on Operating System Design & Implementation, vol.4, pp.14-14, 2000.

A. J. Jara, P. Ved, A. F. Kafle, and . Skarmeta, Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture, Int. J. Ad Hoc Ubiquitous Comput, vol.13, issue.3/4, pp.228-242, 2013.

D. Johnson, C. Perkins, and J. Arkko, Mobility Support in IPv6, RFC, vol.3775, 2004.

, Juniper Networks. Machine-to-Machine (M2M) The Rise of the Machines. white paper, 2011.

J. O. Kephart, Research challenges of autonomic computing, Software Engineering, 2005. ICSE 2005. Proceedings. 27th International Conference on, pp.15-22, 2005.

J. O. Kephart and D. M. Chess, The vision of autonomic computing, Computer, vol.36, issue.1, pp.41-50, 2003.

M. Kirsche and R. Klauck, Unify to bridge gaps: Bringing xmpp into the internet of things, Pervasive Computing and Communications Workshops (PERCOM Workshops, pp.455-458, 2012.

A. Oliva, M. Bagnulo, A. García-martínez, and I. Soto, Performance analysis of the reachability protocol for ipv6 multihoming, Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN '07, pp.443-454, 2007.

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, Delayed internet routing convergence, SIGCOMM Comput. Commun. Rev, vol.30, issue.4, pp.175-187, 2000.
DOI : 10.1145/347059.347428

URL : http://nmgroup.tsinghua.edu.cn/classes/cl10/%5BLMJ01%5D-Delayed%20Internet%20Routing%20Convergence.pdf

J. Laganier and L. Eggert, Host Identity Protocol (HIP) Rendezvous Extension, RFC, vol.5204, 2008.
DOI : 10.17487/rfc8004

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc8004.txt.pdf

R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, Grs: The green, reliability, and security of emerging machine to machine communications, Communications Magazine, vol.49, issue.4, pp.28-35, 2011.

J. Eng-keong-lua, M. Crowcroft, R. Pias, S. Sharma, and . Lim, A survey and comparison of peer-to-peer overlay network schemes, Communications Surveys Tutorials, vol.7, issue.2, pp.72-93, 2005.

R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), 2006.
DOI : 10.17487/rfc4423

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4423.txt.pdf

R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson, Host Identity Protocol, 2008.
DOI : 10.17487/rfc5201

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc5201.txt.pdf

T. Narten, E. Nordmark, W. Simpson, and H. Soliman, Neighbor Discovery for IP version 6 (IPv6). RFC 4861 (Draft Standard), 2007.
DOI : 10.17487/rfc4861

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4861.txt.pdf

W. Ni, J. Wu, C. Huang, and M. Savoie, Analytical models of flow availability in two-layer networks with dedicated path protection, Advances in Optical Networks Control and Management, vol.10, pp.62-76, 2013.
DOI : 10.1016/j.osn.2012.07.005

P. Nikander, A. Gurtov, and T. R. Henderson, Host identity protocol (hip): Connectivity, mobility, multi-homing, security, and privacy over ipv4 and ipv6 networks, Commun. Surveys Tuts, vol.12, issue.2, pp.186-204, 2010.
DOI : 10.1109/surv.2010.021110.00070

P. Nikander, J. Ylitalo, and J. Wall, Integrating security, mobility, and multi-homing in a hip way, Proc. of Network and Distributed Systems Security Symposium (NDSS'03), pp.87-98, 2003.

E. Nordmark and M. Bagnulo, Shim6: Level 3 Multihoming Shim Protocol for IPv6. RFC 5533 (Proposed Standard), 2009.
DOI : 10.17487/rfc5533

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc5533.txt.pdf

. Royc, . Park, D. Jung, G. Shin, K. Kim et al., M2m-based smart health service for human ui/ux using motion recognition, Cluster Computing, pp.1-12, 2014.

L. Pouzin, A proposal for interconnecting packet switching networks, Proceedings of EUROCOMP, pp.1023-1036, 1974.

. Abu-s-reaz, K. Pulak, M. Chowdhury, W. Atiquzzaman, and . Ivancic, Signalling cost analysis of sinemo: seamless end-to-end network mobility, Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, MobiArch '06, pp.37-42, 2006.

Y. Rekhter and T. Li, An Architecture for IP Address Allocation with CIDR, RFC, vol.1518, 1993.
DOI : 10.17487/rfc1518

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc1518.txt.pdf

S. Sahhaf, W. Tavernier, D. Colle, M. Pickavet, and P. Demeester, Availability analysis of resilient geometric routing on internet topology, Design of Reliable Communication Networks (DRCN), pp.1-8, 2014.
DOI : 10.1109/drcn.2014.6816153

URL : https://biblio.ugent.be/publication/5736867/file/5736868.pdf

J. H. Saltzer, D. P. Reed, and D. D. Clark, End-to-end arguments in system design, ACM Trans. Comput. Syst, vol.2, issue.4, pp.277-288, 1984.
DOI : 10.1145/357401.357402

URL : http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf

S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy, An analysis of internet content delivery systems, SIGOPS Oper. Syst. Rev, vol.36, issue.SI, pp.315-327, 2002.
DOI : 10.1145/844128.844158

URL : http://www.mpi-sws.mpg.de/~gummadi/papers/osdi.pdf

C. Tang, Z. Xu, and S. Dwarkadas, Peer-to-peer information retrieval using self-organizing semantic overlay networks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '03, pp.175-186, 2003.
DOI : 10.1145/863973.863976

URL : http://www.cs.rochester.edu/u/sarrmor/publications/pSearch-SIGCOMM03.ps

, Study on facilitating machine to machine communication in 3GPP systems, Technical Specification Group Services and System Aspects, 2007.

A. Mikko and . Uusitalo, Global vision for the future wireless world from the wwrf. Vehicular Technology Magazine, IEEE, vol.1, issue.2, pp.4-8, 2006.

K. Varadhan, R. Govindan, and D. Estrin, Persistent route oscillations in inter-domain routing, Computer Networks, vol.32, issue.1, pp.1-16, 2000.

S. Voulgaris, D. Gavidia, and M. Steen, Cyclon: Inexpensive membership management for unstructured p2p overlays, Journal of Network and Systems Management, vol.13, issue.2, pp.197-217, 2005.

J. Wan, H. Yan, Q. Liu, K. Zhou, R. Lu et al., Enabling cyber-physical systems with machine-to-machine technologies, Int. J. Ad Hoc Ubiquitous Comput, vol.13, issue.3/4, pp.187-196, 2013.

Y. Wan, J. Cao, K. He, H. Zhang, P. Yu et al., Node placement analysis for overlay networks in iot applications, IJDSN, 2014.

J. Xie and I. F. Akyildiz, An optimal location management scheme for minimizing signaling cost in mobile ip, Communications, 2002. ICC 2002. IEEE International Conference on, vol.5, pp.3313-3317, 2002.

Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao et al., Home m2m networks: Architectures, standards, and qos improvement. Communications Magazine, IEEE, vol.49, issue.4, pp.44-52, 2011.

Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao et al., Home M2M networks: Architectures, standards, and QoS improvement, vol.49, pp.44-52, 2011.