.. Solutions-de-sécurité-et-leur-analyse and . La-cryptographie..., 133 6.5.1 Solution simple sans utilisation de

. P{cond, A. 2}-en-fonction-de-la-distance-entre-les-noeuds, B. .. De-la-densité-du-trafic-?, and .. , 101 5.7 P w en fonction de la densité du trafic ? et la densité des noeuds (N s ) . . 102 5.8 P w en fonction de la densité des noeuds N s, p.104

A. Rachedi and A. Benslimane, Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC, Wireless Communications and Mobile Computing, vol.1, issue.1, 2008.
DOI : 10.1002/wcm.690

URL : https://hal.archives-ouvertes.fr/hal-00619745

A. Rachedi and A. Benslimane, Toward a Cross-layer Monitoring Process for Mobile Ad Hoc Networks, Journal of Security and Communication Network, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00619749

A. Rachedi, A. Benslimane, H. Otrok, N. Mohammed, and M. Debbabi, A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.12-14, 2008.
DOI : 10.1109/WiMob.2008.77

URL : https://hal.archives-ouvertes.fr/hal-00680879

A. Rachedi and A. Benslimane, Smart Attacks Based on Control Packets Vulnerabilities with IEEE 802.11 MAC, 2008 International Wireless Communications and Mobile Computing Conference, pp.588-593, 2008.
DOI : 10.1109/IWCMC.2008.102

URL : https://hal.archives-ouvertes.fr/hal-00680881

A. Benslimane and A. Rachedi, Relative Fairness and Optimized throughput for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Communications, pp.2233-2237, 2008.
DOI : 10.1109/ICC.2008.426

URL : https://hal.archives-ouvertes.fr/hal-00680884

A. Rachedi and A. Benslimane, Cross-Layer approach to improve the monitoring process for Mobile Ad Hoc Networks based on IEEE 802, 50th Anniversary of the annual IEEE Global Telecommunications Conference, pp.1086-1091, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00680886

A. Rachedi, A. Benslimane, L. Guang, and C. Assi, A Confident Community to Secure Mobile Ad Hoc Networks, 2007 IEEE International Conference on Communications, pp.1254-1259, 2007.
DOI : 10.1109/ICC.2007.212

URL : https://hal.archives-ouvertes.fr/hal-00680887

A. Rachedi and A. Benslimane, A Secure Architecture for Mobile Ad Hoc Networks, proceeding of the 2nd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN2006), pp.424-435, 2006.
DOI : 10.1007/11943952_36

URL : https://hal.archives-ouvertes.fr/hal-00680891

A. Rachedi and A. Benslimane, Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks, 2006 International Conference on Systems and Networks Communications (ICSNC'06), p.72, 2006.
DOI : 10.1109/ICSNC.2006.74

URL : https://hal.archives-ouvertes.fr/hal-00680894

A. Rachedi and A. Benslimane, Architecture Hiérarchique Distribuée pour sécuriser les réseaux Ad hoc Mobiles, 8ème Journées Doctorales en Informatique et Réseaux, pp.17-19, 2007.

A. Belkhir, A. Naci, and . Rachedi, Contribution à la sécurité du PDA : IDS Embarqué EIDS, SAR'04 (rencontre francophone sur Sécurité et Architecture Réseaux), 3ème Conférence sur la Sécurité et Architectures Réseaux, 2004.

. Bechler, A cluster-based security architecture for ad hoc networks, IEEE INFOCOM 2004, pp.2393-2403, 2004.
DOI : 10.1109/INFCOM.2004.1354661

). G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, vol.18, issue.3, pp.18-21, 2000.
DOI : 10.1109/49.840210

V. L. Boudec, M. Boudec, and . Vojnovic, Perfect simulation and stationarity of a class of mobility models, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1498557

. Buchegger, ). S. Boudec, J. L. Buchegger, and . Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.2234-2240, 2002.
DOI : 10.1109/EMPDP.2002.994321

. Buchegger, ). S. Boudec, J. L. Buchegger, and . Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, 2002.
DOI : 10.1145/513800.513828

). C. Budakoglu-et-gulliver, T. A. Budakoglu, and . Gulliver, Hierarchical key management for mobile ad-hoc networks, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.2735-2738, 2004.
DOI : 10.1109/VETECF.2004.1400555

). L. Buttyan-et-hubaux, J. Buttyan, and . Hubaux, Report on a working session on security in wireless ad hoc networks, ACM Mobile Computing and Communications Review, issue.MC2R, 2002.

). L. Buttyan-et-hubaux, J. Buttyan, and . Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications 8-5, pp.579-592, 2003.

(. C. Castelluccia, ). N. Yi, J. H. Castelluccia, and . Yi, Robust self-keying mobile ad hoc networks, Computer Networks, vol.51, issue.4, pp.1169-1182, 2007.
DOI : 10.1016/j.comnet.2006.07.009

(. C. Satizabal-)-j, J. Satizabal, and . Hernandez-serrano, Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks, Computer Communications, vol.30, issue.7, pp.1498-1512, 2007.
DOI : 10.1016/j.comcom.2006.12.024

. Capkun, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, pp.52-64, 2002.
DOI : 10.1109/TMC.2003.1195151

E. Charles, . Perkins, ). E. Chakeres, E. Charles, I. Perkins et al., Ad Hoc On Demand Distance Vector (AODV) Routing. Dans les actes de IETF Internet draft, draft-perkins-manet-aodvbis-00, 2003.

. Chiang, Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel, pp.197-211, 1997.

(. D. Malone-)-d, K. Malone, and . Duffy, Modeling the 802.11 Distributed Coordination Function in Non-saturated Heterogeneous Conditions, IEEE/ACM Transactions on Networking, 2006.

B. David, . Johnson, ). D. Broch, B. David, J. Johnson et al., The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, les actes de Ad Hoc Networking, pp.139-172, 2001.

(. F. Daneshgaran, ). M. Daneshgaran, and M. Laddomada, Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects Authors, 2008.

). L. Feeney-et-nilsson, M. Feeney, and . Nilsson, Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment, pp.1548-1557, 2001.

. Gerla, ). M. Tsai, J. T. Gerla, and . Tsai, Multicluster, mobile, multimedia radio network, Wireless Networks, vol.75, issue.3, pp.255-265, 1995.
DOI : 10.1007/BF01200845

. Guang, MAC layer misbehavior in wireless networks: challenges and solutions, IEEE Wireless Communications, vol.15, issue.4, 2008.
DOI : 10.1109/MWC.2008.4599216

URL : https://hal.archives-ouvertes.fr/hal-01317443

. Hu, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Dans les actes de Eighth Annual International Conference on Mobile Computing and Networking (MobiCom'02), 2002.
DOI : 10.1007/s11276-004-4744-y

L. Huang, W. Huang, and . Lee, A cooperative intrusion detection system for ad hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.135-147, 2003.
DOI : 10.1145/986858.986877

M. Hung, Hung et I. Marsic Analysis of Non-Saturation and Saturation Performance of IEEE 802.11 DCF in the Presence of Hidden Stations, 2007.

(. J. Kong, ). X. Gerla, M. Kong, and . Gerla, An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol.6, issue.8, pp.888-902, 2007.
DOI : 10.1109/TMC.2007.1021

(. K. El-khatib-et-yee, ). R. El-khatib, L. Korba, and G. Yee, Secure dynamic distributed routing algorithm for ad hoc wireless networks, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings., pp.359-366, 2003.
DOI : 10.1109/ICPPW.2003.1240390

(. K. Xu, ). M. Bae, S. Xu, and . Bae, Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks, Ad Hoc Networks, vol.1, issue.1, pp.107-123, 2003.
DOI : 10.1016/S1570-8705(03)00015-5

). P. Karn, MACA-A new Channel Access Method for Packet Radio, les actes de ARRL/CRRL Amature Radio 9th Computer Networking Conference, pp.134-140, 1990.

. Kyasanur, ). P. Vaidya, N. Kyasanur, and . Vaidya, Selfish MAC layer misbehavior in wireless networks, IEEE Transactions on Mobile Computing, vol.4, issue.5, pp.4-5, 2005.
DOI : 10.1109/TMC.2005.71

(. L. Guang, ). C. Benslimane, A. Guang, and . Benslimane, Interlayer Attacks in Mobile Ad Hoc Networks, les actes de International Conference on Mobile Ad-hoc and Sensor Networks, pp.436-448, 2006.
DOI : 10.1007/11943952_37

URL : https://hal.archives-ouvertes.fr/hal-01317428

(. L. Zhe-et-ye, ). L. Zhe, L. Jun, and L. Ye, A security enhanced aodv routing protocol, les actes de Mobile Ad-hoc and Sensor Networks (MSN2005), pp.298-307, 2005.

L. Et-poovendran, ). L. Lazos, and R. Poovendran, Cross-layer design for energy-efficient secure multicast in ad hoc networks, Ad Hoc Networks, pp.3633-3639, 2004.

). S. Leffler, MADWiFi project, 2007.

). H. Buttyán, Rational Exchange - A Formal Model Based on Game Theory, les actes de 2nd International Workshop on Electronic Commerce (WELCOM), pp.16-17, 2001.
DOI : 10.1007/3-540-45598-1_12

). G. License, Wireshark : Capture packet analyser, 2008.

(. M. Al-shurman, ). S. Al-shurman, and S. M. Yoo, Black hole attack in mobile Ad Hoc networks, Proceedings of the 42nd annual Southeast regional conference on , ACM-SE 42, pp.96-97, 2004.
DOI : 10.1145/986537.986560

(. M. Cagalj, ). I. Hubaux, S. Cagalj, J. Ganeriwal, and . Hubaux, On cheating in csma/ca ad hoc networks, 2003.

(. M. Maroti-)-s, P. Maroti, and . Volgyesi, Radio interferometric geolocation, pp.1-12, 2005.

(. M. Pirretti, ). V. Brooks, S. Pirretti, R. Zhu, and . Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, International Journal of Distributed Sensor Networks, vol.19, issue.2, pp.2-3, 2005.
DOI : 10.1080/15501320600642718

M. , G. Marti, and H. Garcia-molina, Taxonomy of trust : Categorizing p2p reputation system. Dans les actes de COMNET Special Issue on Trust and Reputation in Peer-to-Peer Systems, 2005.

). K. Masmoudi, Trust management in personal networks, 2008.

(. M. Reed-)-d, P. F. Reed, and . Syverson, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998.
DOI : 10.1109/49.668972

M. Et-molva, ). P. Michiardi, and R. Molva, Core : A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, pp.107-121, 2002.

N. R. Potlapally-)-a, S. Potlapally, and . Ravi, Analyzing the energy consumption of security protocols, Proceedings of the 2003 international symposium on Low power electronics and design , ISLPED '03, pp.30-35, 2003.
DOI : 10.1145/871506.871518

). S. Patel, An Efficient MAC for Short Messages, les actes de Selected Areas in Cryptography (SAC2002), pp.353-368, 2002.
DOI : 10.1007/3-540-36492-7_23

(. R. Kodikara-et-ahlund, ). A. Kodikara, and C. Ahlund, ConEx : Context Exchange in MANETs for Real time multimedia, les actes de International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, p.70, 2006.

(. R. Sam, ). B. Reddy, P. C. Sam, and . Reddy, Denial of Service attack through compromised nodes in Mobile Ad-Hoc Networks, Academic Open Internet Journal, vol.21, 2007.

R. Et-benslimane, ). A. Rachedi, and A. Benslimane, A secure Architecture for Mobile Ad Hoc Networks, les actes de International Conference on Mobile Ad-Hoc and Sensor Networks (MSN'06), pp.424-435, 2006.

(. S. Chokhani-)-r, W. Chokhani, and . Ford, Internet X.509 public key infrastructure certificate policy and certification practices framework, 2003.

(. S. Ray-)-d and . Ray, On False Blocking in RTS/CTS-Based Multihop Wireless Networks, IEEE Transactions on Vehicular Technology, vol.56, issue.2, pp.849-862, 2007.
DOI : 10.1109/TVT.2007.891476

(. S. Yi-)-r and . Yi, MOCA : Mobile Certificate Authority for Wireless Ad-hoc Networks, Dans les actes de 2 nd Annual PKI Research Workshop (PKI'03), 2003.

. Sanzgiri, An Authenticated Routing Protocol for Secure Ad Hoc Networks, les actes de Selected Areas in Communication (JSAC), pp.598-610, 2005.

. Sanzgiri, Authenticated routing for ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.23, issue.3, pp.598-610, 2005.
DOI : 10.1109/JSAC.2004.842547

). A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1995.
DOI : 10.1145/359168.359176

. Sk, . M. Md, . Rahman, ). T. Okamoto, . Sk et al., Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks, Report, vol.328, 2006.

(. T. Beth, ). M. Klein, B. Beth, and . Klein, Valuation of trust in open networks, les actes de European Symposium on Research in Computer Security (ESORICS'94), 1994.
DOI : 10.1007/3-540-58618-0_53

). H. Takagi-et-kleinrock, L. Takagi, and . Kleinrock, Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals, pp.32-34, 1984.

. Toumpis, ). S. Goldsmith, A. Toumpis, and . Goldsmith, Performance, optimization, and cross-layer design of media access protocols for wireless ad hoc networks, IEEE International Conference on Communications, 2003. ICC '03., pp.2234-2240, 2003.
DOI : 10.1109/ICC.2003.1204060

T. Et-wahington, ). W. Trappe, and L. Wahington, Introduction to cryptography with coding theory, 2006.

(. W. Xu, Y. Z. Xu, and W. Trappe, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005.
DOI : 10.1145/1062689.1062697

). H. , E. S. Bin, and C. Wei, An active detecting method against syn flooding attack, les actes de International Conference on Parallel and Distributed Systems, pp.709-715, 2005.

(. X. Huang, ). Y. Zhang, W. Huang, F. Susilo, and . Zhang, Short (identitybased ) strong designated verifier signature schemes, les actes de International Conference Information Security Practice and Exprience (ISPEC'06) LNCS 3903, pp.214-225, 2006.

(. X. Xue, ). J. Benothman, J. Xue, and . Benothman, A Trust-Based Routing Protocol for Ad Hoc Networks, les actes de Mobile and Wireless Communications Networks, 2004.
DOI : 10.1007/0-387-23150-1_22

URL : https://hal.archives-ouvertes.fr/hal-00150929

). Hu and A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad Hoc Networks, vol.1, issue.1, 2002.
DOI : 10.1016/S1570-8705(03)00019-2

). Hu and A. Perrig, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209219

). A. Dong and H. W. Go, Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp.2442-2452, 2007.
DOI : 10.1109/SECURECOMM.2005.57

(. Y. Zhang, ). W. Lou, W. Zhang, and . Lou, Anonymous Communication in Mobile Ad Hoc Networks, les actes de IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), pp.1940-1951, 2005.

Y. Et-kravets, ). S. Yi, and R. Kravets, Quality of Authentication in Ad Hoc Networks, 2004.

(. Z. Trabelsi, ). K. Frikha, H. Trabelsi, M. Rahmani, and . Frikha, Malicious sniffing systems detection platform, CCECE 2003, Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436), pp.201-207, 2004.
DOI : 10.1109/SAINT.2004.1266117

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.459.2714

L. Zhang, W. Zhang, and . Lee, Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.275-283, 2000.
DOI : 10.1145/345910.345958

. Zhou, ). L. Haas, Z. J. Zhou, and . Haas, Securing ad hoc networks, IEEE Network, vol.13, issue.6, pp.24-30, 1999.
DOI : 10.1109/65.806983

). P. Zimmermann, The official PGP user's guide, 1995.