elle est obtenue en calculant la distribution de taux de livraison parmi les n÷uds. C'est l'écart type de la probabilité du succès de livraison des n÷uds de l'équation ,
elle est directement proportionnelle à la longueur moyenne des chemins en cas d'attaques, puisque nous considérons seulement les phénomènes de la couche routage ,
L'eet du biais sur l'ecacité de délai (DE) est également conservé grâce à l'allongement des routes. Nous remarquons, de la même façon que dans nos simulations, que le taux de livraison (ADR) et le débit moyen (AT) sont améliorés par rapport au scénario sans réplication ,
Resiliency of wireless sensor networks: Definitions and analyses, 2010 17th International Conference on Telecommunications, 2010. ,
DOI : 10.1109/ICTEL.2010.5478822
URL : https://hal.archives-ouvertes.fr/inria-00524365
Biased random walk model to estimate routing performance in sensor networks, 9eme Rencontres Francophones sur les Aspects Algorithmiques des Telecommunications, p.7376, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00176946
Air pollution monitoring and mining based on sensor grid in london, Sensors, 2008. ,
Report from the eld : Results from an agricultural wireless sensor network, In the 29th Annual IEEE International Conference on Local Computer Networks (LCN), 2004. ,
Industrial routing requirements in low-power and lossy networks, RFC5673 (Proposed Standard), 2009. ,
DOI : 10.17487/rfc5673
Home automation routing requirements in lowpower and lossy networks, RFC5826 (Proposed Standard), 2010. ,
Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, p.393422, 2002. ,
DOI : 10.1016/S1389-1286(01)00302-4
A Survey of Challenges and Applications of Wireless Body Area Network (WBAN) and Role of a Virtual Doctor Server in Existing Architecture, 2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012. ,
DOI : 10.1109/ISMS.2012.108
Report from the IAB workshop on Unwanted Trac, RFC, vol.4948, 2006. ,
Wireless sensor network security : A survey, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007. ,
Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, p.5273, 2009. ,
DOI : 10.1109/SURV.2009.090205
Denial of service in sensor networks, Computer, vol.35, issue.10, p.5462, 2002. ,
DOI : 10.1109/MC.2002.1039518
Secure routing in wireless sensor networks : attacks and countermeasures, Ad Hoc Networks, p.293315, 2003. ,
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, Sicherheit -Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 2006. ,
DOI : 10.1007/11734666_9
Survivable network system analysis: a case study, IEEE Software, vol.16, issue.4, p.7077, 1999. ,
DOI : 10.1109/52.776952
Survivable mobile wireless networks, Proceedings of the ACM workshop on Wireless security , WiSE '02, 2002. ,
DOI : 10.1145/570681.570685
Computer security threat monitoring and surveillance, James P, 1980. ,
An intrusion detection model, 1986. ,
Guide to intrusion detection and prevention systems (idps), 2010. ,
DOI : 10.6028/NIST.SP.800-94
The mathematcal theory of communication, 1949. ,
Dynamic Source Routing in Ad Hoc Wireless Networks, 1996. ,
DOI : 10.1007/978-0-585-29603-6_5
Energy ecient routing in wireless sensor networks, Military Communications Conference Proceedings on Communications for Network-Centric Operations : Creating the Information Force, 2001. ,
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000. ,
DOI : 10.1145/345910.345953
Constrained random walks on random graphs, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications , WSNA '02, 2002. ,
DOI : 10.1145/570738.570741
Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005. ,
DOI : 10.1109/SP.2005.8
Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, p.5357, 2004. ,
DOI : 10.1145/990680.990707
Jamming sensor networks: attack and defense strategies, IEEE Network, vol.20, issue.3, p.4147, 2006. ,
DOI : 10.1109/MNET.2006.1637931
Dynamic Jamming Mitigation for Wireless Broadcast Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.177
Broadcast Control Channel Jamming: Resilience and Identification of Traitors, 2007 IEEE International Symposium on Information Theory, 2007. ,
DOI : 10.1109/ISIT.2007.4557594
Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Transactions on Mobile Computing, vol.8, issue.9, p.12211234, 2009. ,
DOI : 10.1109/TMC.2009.33
JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), 2003. ,
DOI : 10.1109/REAL.2003.1253275
An ontology for attacks in wireless sensor networks, INRIA, 2008. ,
Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, p.347358, 2008. ,
DOI : 10.1109/TIFS.2008.926098
Contributions a la securite dans les reseaux mobiles ad-hoc, 2008. ,
URL : https://hal.archives-ouvertes.fr/tel-00683602
Energy-ecient link-layer jamming attacks against wireless sensor network mac protocols, ACM Transactions on Sensor Networks, vol.5, issue.1, p.138, 2009. ,
DOI : 10.1145/1464420.1464426
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.590.3792
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, 2004. ,
DOI : 10.1145/984622.984660
Active detection of node replication attacks, International Journal of Computer Science and Network Security (IJCSNS), vol.9, p.1321, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00464634
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000. ,
DOI : 10.1145/345910.345955
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Communications and Multimedia BIBLIOGRAPHIE Security, ser. IFIP Conference Proceedings, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
Highly-resilient, energy-ecient multipath routing in wireless sensor networks, 2nd ACM international symposium on Mobile ad hoc networking & computing. Long Beach, 2001. ,
Locating a target with an agent guided by unreliable local advice, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, 2010. ,
DOI : 10.1145/1835698.1835781
URL : https://hal.archives-ouvertes.fr/hal-00516695
Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003. ,
DOI : 10.1109/INFCOM.2003.1209219
Using directional antennas to prevent wormhole attacks, Network and Distributed System Security Symposium, 2004. ,
Detecting wormhole attacks in wireless networks using local neighborhood information, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications ,
DOI : 10.1109/PIMRC.2008.4699583
URL : https://hal.archives-ouvertes.fr/hal-00402737
Distributed Localization Protocol for Routing in a Noisy Wireless Sensor Network, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009. ,
DOI : 10.1109/MSN.2009.83
Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, 2004. ,
DOI : 10.1145/1029102.1029116
Secure data aggregation in wireless sensor network : a survey, Proceedings of the 6th Australasian Information Security Conference (AISC), 2008. ,
Secure aggregation for wireless network, Symposium on Applications and the Internet Workshops (SAINT), 2003. ,
Ecient secure aggregation in sensor networks, 11th International Conference on High Performance Computing (HiPC), 2004. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001. ,
DOI : 10.1145/381677.381696
Sdap : a secure hop-by-hop data aggregation protocol for sensor networks, Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2006. ,
SIA: Secure information aggregation in sensor networks, Journal of Computer Security, vol.15, issue.1, p.69102, 2007. ,
DOI : 10.3233/JCS-2007-15104
Secure hierarchical in-network aggregation in sensor networks, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180440
A witness-based approach for data fusion assurance in wireless sensor networks, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003. ,
DOI : 10.1109/GLOCOM.2003.1258475
SecureDAV: a secure data aggregation and verification protocol for sensor networks, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004. ,
DOI : 10.1109/GLOCOM.2004.1378395
A dynamic en-route scheme for ltering false data injection in wireless sensor networks, 25th IEEE International Conference on Computer Communications , Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2006. ,
Concealed data aggregation for reverse multicast trac in sensor networks : Encryption, key distribution, and routing adaptation, IEEE Transactions on Mobile Computing, vol.5, issue.10, p.14171431, 2006. ,
A Provably Secure Additive and Multiplicative Privacy Homomorphism*, 5th International Conference on Information Security (ISC), 2002. ,
DOI : 10.1007/3-540-45811-5_37
Ecient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions Sensor Networks, vol.5, issue.3, p.136, 2009. ,
Secure rotuing for mobile ad hoc networks, Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002. ,
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, p.2138, 2005. ,
DOI : 10.1145/570645.570648
A secure routing protocol for ad hoc networks, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., 2002. ,
DOI : 10.1109/ICNP.2002.1181388
The tesla broadcast authentication protocol, RSA CryptoBytes, 2002. ,
Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers, ACM SIGCOMM Computer Communication Review, vol.24, issue.4, p.234244, 1994. ,
A secure hierarchical model for sensor network, ACM SIGMOD Record, vol.33, issue.1, p.713, 2004. ,
DOI : 10.1145/974121.974123
Nuglets : a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, BIBLIOGRAPHIE, 2001. ,
Eciency of routing and resilience mechanisms in packet-switched communication networks, European Transactions on Telecommunications, vol.21, p.108120, 2010. ,
A Resilient Multipath Routing Protocol for Wireless Sensor Networks, International Conference on Networking ,
DOI : 10.1007/978-3-540-31957-3_128
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference ,
DOI : 10.1109/GLOCOM.2007.245
SIGF, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, 2006. ,
DOI : 10.1145/1180345.1180351
Igf : A state-free robust communication protocol for wireless sensor networks, pp.2003-2014, 2003. ,
Random walks on graphs : A survey, 1993. ,
Markov Chains and Random Walks, p.127160, 1995. ,
DOI : 10.1017/CBO9780511814075.007
Performance of random walks in one-hop replication networks, Computer Networks, vol.54, issue.5, p.781796, 2010. ,
DOI : 10.1016/j.comnet.2009.10.006
Resistences and currents in innite electrical networks, J. Comb. Theory, p.87102, 1990. ,
Pólya's random walk constant, Mathematical Constants, p.322331, 2003. ,
Reversible Markov Chains and Random Walks on Graphs, 2002. ,
Group representations in probability and statistics, Inst. of Math. Statistics, 1988. ,
On the second eigenvalue and random walks in randomd-regular graphs, Combinatorica, vol.62, issue.3, p.331362, 1991. ,
DOI : 10.1007/BF01275669
The self-avoiding walk: A brief survey, Surveys in Stochastic Processes Proceedings of the Thirty-third SPA Conference, 2009. ,
DOI : 10.4171/072-1/9
Analysis of Random Walks Using Tabu Lists, 19th International Colloquium of Structural Information and Communication Complexity (SIROCCO), 2012. ,
DOI : 10.1007/978-3-642-31104-8_22
Service siscovery in manet via biased random walks, Autonomics, 2007. ,
A Biased Random Walk Routing Protocol for Wireless Sensor Networks: The Lukewarm Potato Protocol, IEEE Transactions on Mobile Computing, vol.9, issue.11, 2010. ,
DOI : 10.1109/TMC.2010.131
Measurement frameworks and metrics for resilient networks and services, European Network and Information Security Agency (ENISA), 2011. ,
Analyzing resilience to node misbehaviors in wireless multihop networks, Wireless Communications and Networking Conference ,
Structure-Based Resilience Metrics for Service-Oriented Networks, IEEE Transactions on Services Computing, vol.2, issue.3, p.183196, 2009. ,
DOI : 10.1007/11408901_26
An approach to quantifying resilience in mobile ad hoc networks, Design of Reliable Communication Networks (DRCN) ,
Encyclopedic Dictionary of the Materials Science, Dunod, 2008. ,
Toward a conceptual framework for resilience engineering, IEEE Systems Journals, vol.3, issue.2, p.181191, 2009. ,
Multiterminal resilience for series-parallel networks, Networks, vol.13, issue.2, p.164172, 2007. ,
DOI : 10.1002/net.20186
Network resilience: a measure of network fault tolerance, IEEE Transactions on Computers, vol.39, issue.2, p.174181, 1990. ,
DOI : 10.1109/12.45203
A quantitative survivability evaluation model for wireless sensor networks, IEEE International Conference on Networking, Sensing and Control, 2006. ,
Toward resilient security in wireless sensor networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, 2005. ,
DOI : 10.1145/1062689.1062696
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, Computer Networks, vol.54, issue.8, p.12451265, 2010. ,
DOI : 10.1016/j.comnet.2010.03.005
A survey of resilience dierentiation frameworks in communication networks, IEEE Communications Surveys & Tutorials, vol.9, issue.4, p.3255, 2007. ,
A survey of survivability in mobile ad hoc networks, IEEE Communications Surveys & Tutorials, vol.11, issue.1, p.13, 2009. ,
DOI : 10.1109/SURV.2009.090106
URL : https://hal.archives-ouvertes.fr/hal-01168681
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, p.1133, 2004. ,
DOI : 10.1109/TDSC.2004.2
DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., 1985. ,
DOI : 10.1109/FTCSH.1995.532603
Internet Security: An Intrusion-Tolerance Approach, Proceedings of the IEEE, 2006. ,
DOI : 10.1109/JPROC.2005.862320
Modélisation stochastique de réseaux radio, 2005. ,
Directed diusion : a scalable and robust communication paradigm for sensor networks, Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000. ,
Rpl : Ipv6 routing protocol for low-power and lossy networks, 2012. ,
Random walks and random environments, p.119121, 1995. ,
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, p.382401, 1982. ,
DOI : 10.1145/357172.357176
Methode resiliente a la presence des noeuds compromis pour la determination des routes par un protocole de routage dans un reseau, 2011. ,
Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, 2004. ,
DOI : 10.1145/1029102.1029116
Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, p.17901801, 2009. ,
DOI : 10.1016/j.comcom.2009.07.010