D. De-livraison-du-réseau, elle est obtenue en calculant la distribution de taux de livraison parmi les n÷uds. C'est l'écart type de la probabilité du succès de livraison des n÷uds de l'équation

D. Du-délai-moyen, elle est directement proportionnelle à la longueur moyenne des chemins en cas d'attaques, puisque nous considérons seulement les phénomènes de la couche routage

. Entraîne-un-doublement-de-la-consommation-d-'énergie, L'eet du biais sur l'ecacité de délai (DE) est également conservé grâce à l'allongement des routes. Nous remarquons, de la même façon que dans nos simulations, que le taux de livraison (ADR) et le débit moyen (AT) sont améliorés par rapport au scénario sans réplication

O. Erdene-ochir, M. Minier, F. Valois, and A. Kountouris, Resiliency of wireless sensor networks: Definitions and analyses, 2010 17th International Conference on Telecommunications, 2010.
DOI : 10.1109/ICTEL.2010.5478822

URL : https://hal.archives-ouvertes.fr/inria-00524365

I. Mabrouki, G. Froc, and X. Lagrange, Biased random walk model to estimate routing performance in sensor networks, 9eme Rencontres Francophones sur les Aspects Algorithmiques des Telecommunications, p.7376, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00176946

Y. Ma, M. Richards, M. Ghanem, Y. Guo, and J. Hassard, Air pollution monitoring and mining based on sensor grid in london, Sensors, 2008.

R. Beckwith, D. Teibel, and P. Bowen, Report from the eld : Results from an agricultural wireless sensor network, In the 29th Annual IEEE International Conference on Local Computer Networks (LCN), 2004.

K. Pister, T. Phinney, and P. Thubert, Industrial routing requirements in low-power and lossy networks, RFC5673 (Proposed Standard), 2009.
DOI : 10.17487/rfc5673

A. Brandt, J. Buron, and G. Porcu, Home automation routing requirements in lowpower and lossy networks, RFC5826 (Proposed Standard), 2010.

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, p.393422, 2002.
DOI : 10.1016/S1389-1286(01)00302-4

D. Barakah, A Survey of Challenges and Applications of Wireless Body Area Network (WBAN) and Role of a Virtual Doctor Server in Existing Architecture, 2012 Third International Conference on Intelligent Systems Modelling and Simulation, 2012.
DOI : 10.1109/ISMS.2012.108

E. D. Andersson and L. Zhang, Report from the IAB workshop on Unwanted Trac, RFC, vol.4948, 2006.

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless sensor network security : A survey, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007.

X. Chen, K. Makki, K. Yen, and N. Pissinou, Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, p.5273, 2009.
DOI : 10.1109/SURV.2009.090205

A. Wood and J. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, p.5462, 2002.
DOI : 10.1109/MC.2002.1039518

C. Karlof and D. Wagner, Secure routing in wireless sensor networks : attacks and countermeasures, Ad Hoc Networks, p.293315, 2003.

A. Becher, Z. Benenson, and M. Dornseif, Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, Sicherheit -Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 2006.
DOI : 10.1007/11734666_9

R. J. Ellison, R. C. Linger, T. Longsta, and N. R. Mead, Survivable network system analysis: a case study, IEEE Software, vol.16, issue.4, p.7077, 1999.
DOI : 10.1109/52.776952

J. P. Sterbenz, R. Krishnan, R. Hain, A. Jackson, D. Levin et al., Survivable mobile wireless networks, Proceedings of the ACM workshop on Wireless security , WiSE '02, 2002.
DOI : 10.1145/570681.570685

J. Anderson, Computer security threat monitoring and surveillance, James P, 1980.

D. Denning, An intrusion detection model, 1986.

K. Scarfone and P. Mell, Guide to intrusion detection and prevention systems (idps), 2010.
DOI : 10.6028/NIST.SP.800-94

C. Shannon, The mathematcal theory of communication, 1949.

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, 1996.
DOI : 10.1007/978-0-585-29603-6_5

C. Schurgers and M. B. Srivastava, Energy ecient routing in wireless sensor networks, Military Communications Conference Proceedings on Communications for Network-Centric Operations : Creating the Information Force, 2001.

B. Karp and H. T. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345953

S. D. Servetto and G. Barrenechea, Constrained random walks on random graphs, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications , WSNA '02, 2002.
DOI : 10.1145/570738.570741

B. Parno, A. Perrig, and V. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.8

A. Perrig, J. Stankovic, D. Wagner, and C. Rosenblatt, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, p.5357, 2004.
DOI : 10.1145/990680.990707

X. Wenyuan, M. Ke, W. Trappe, and Z. Yanyong, Jamming sensor networks: attack and defense strategies, IEEE Network, vol.20, issue.3, p.4147, 2006.
DOI : 10.1109/MNET.2006.1637931

J. T. Chiang and Y. Hu, Dynamic Jamming Mitigation for Wireless Broadcast Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.177

A. Chan, X. Liu, G. Noubir, and B. Thapa, Broadcast Control Channel Jamming: Resilience and Identification of Traitors, 2007 IEEE International Symposium on Information Theory, 2007.
DOI : 10.1109/ISIT.2007.4557594

P. Tague, M. Li, and R. Poovendran, Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Transactions on Mobile Computing, vol.8, issue.9, p.12211234, 2009.
DOI : 10.1109/TMC.2009.33

A. D. Wood, J. A. Stankovic, and S. H. Son, JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), 2003.
DOI : 10.1109/REAL.2003.1253275

W. Znaidi, M. Minier, and J. Babau, An ontology for attacks in wireless sensor networks, INRIA, 2008.

A. L. Toledo and X. Wang, Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, p.347358, 2008.
DOI : 10.1109/TIFS.2008.926098

A. Rachedi, Contributions a la securite dans les reseaux mobiles ad-hoc, 2008.
URL : https://hal.archives-ouvertes.fr/tel-00683602

Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel et al., Energy-ecient link-layer jamming attacks against wireless sensor network mac protocols, ACM Transactions on Sensor Networks, vol.5, issue.1, p.138, 2009.
DOI : 10.1145/1464420.1464426

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.590.3792

J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, 2004.
DOI : 10.1145/984622.984660

C. A. Melchor, B. Ait-salem, P. Gaborit, and K. Tamine, Active detection of node replication attacks, International Journal of Computer Science and Network Security (IJCSNS), vol.9, p.1321, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00464634

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345955

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Communications and Multimedia BIBLIOGRAPHIE Security, ser. IFIP Conference Proceedings, 2002.
DOI : 10.1007/978-0-387-35612-9_9

D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-resilient, energy-ecient multipath routing in wireless sensor networks, 2nd ACM international symposium on Mobile ad hoc networking & computing. Long Beach, 2001.

N. Hanusse, D. Ilcinkas, A. Kosowski, and N. Nisse, Locating a target with an agent guided by unreliable local advice, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, 2010.
DOI : 10.1145/1835698.1835781

URL : https://hal.archives-ouvertes.fr/hal-00516695

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209219

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, Network and Distributed System Security Symposium, 2004.

W. Znaidi, M. Minier, and J. Babau, Detecting wormhole attacks in wireless networks using local neighborhood information, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications
DOI : 10.1109/PIMRC.2008.4699583

URL : https://hal.archives-ouvertes.fr/hal-00402737

K. Heurtefeux and F. Valois, Distributed Localization Protocol for Routing in a Noisy Wireless Sensor Network, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
DOI : 10.1109/MSN.2009.83

D. Wagner, Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, 2004.
DOI : 10.1145/1029102.1029116

H. Alzaid, E. Foo, and J. G. Nieto, Secure data aggregation in wireless sensor network : a survey, Proceedings of the 6th Australasian Information Security Conference (AISC), 2008.

L. Hu and D. Evans, Secure aggregation for wireless network, Symposium on Applications and the Internet Workshops (SAINT), 2003.

P. Jadia and A. Mathuria, Ecient secure aggregation in sensor networks, 11th International Conference on High Performance Computing (HiPC), 2004.

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001.
DOI : 10.1145/381677.381696

Y. Yang, X. Wang, S. Zhu, and G. Cao, Sdap : a secure hop-by-hop data aggregation protocol for sensor networks, Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2006.

H. Chan, A. Perrig, B. Przydatek, and D. Song, SIA: Secure information aggregation in sensor networks, Journal of Computer Security, vol.15, issue.1, p.69102, 2007.
DOI : 10.3233/JCS-2007-15104

]. H. Chan, A. Perrig, and D. X. Song, Secure hierarchical in-network aggregation in sensor networks, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180440

W. Du, J. Deng, Y. S. Han, and P. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003.
DOI : 10.1109/GLOCOM.2003.1258475

A. Mahimkar and T. Rappaport, SecureDAV: a secure data aggregation and verification protocol for sensor networks, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004.
DOI : 10.1109/GLOCOM.2004.1378395

Z. Yu and Y. Guan, A dynamic en-route scheme for ltering false data injection in wireless sensor networks, 25th IEEE International Conference on Computer Communications , Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2006.

D. Westho, J. Girão, and M. Acharya, Concealed data aggregation for reverse multicast trac in sensor networks : Encryption, key distribution, and routing adaptation, IEEE Transactions on Mobile Computing, vol.5, issue.10, p.14171431, 2006.

J. Domingo-ferrer, A Provably Secure Additive and Multiplicative Privacy Homomorphism*, 5th International Conference on Information Security (ISC), 2002.
DOI : 10.1007/3-540-45811-5_37

C. Castelluccia, A. C. Chan, E. Mykletun, and G. Tsudik, Ecient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions Sensor Networks, vol.5, issue.3, p.136, 2009.

P. Papadimitratos and Z. Haas, Secure rotuing for mobile ad hoc networks, Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.

Y. C. Hu, A. Perrig, and D. B. Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, p.2138, 2005.
DOI : 10.1145/570645.570648

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-royer, A secure routing protocol for ad hoc networks, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., 2002.
DOI : 10.1109/ICNP.2002.1181388

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, The tesla broadcast authentication protocol, RSA CryptoBytes, 2002.

C. E. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers, ACM SIGCOMM Computer Communication Review, vol.24, issue.4, p.234244, 1994.

M. Tubaishat, J. Yin, B. Panja, and S. Madria, A secure hierarchical model for sensor network, ACM SIGMOD Record, vol.33, issue.1, p.713, 2004.
DOI : 10.1145/974121.974123

L. Buttyán and J. Hubaux, Nuglets : a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, BIBLIOGRAPHIE, 2001.

M. Menth, R. Martin, M. Hartmann, and U. Spörlein, Eciency of routing and resilience mechanisms in packet-switched communication networks, European Transactions on Telecommunications, vol.21, p.108120, 2010.

K. Kim, W. Jung, J. Park, H. Seo, S. Jo et al., A Resilient Multipath Routing Protocol for Wireless Sensor Networks, International Conference on Networking
DOI : 10.1007/978-3-540-31957-3_128

T. Roosta, S. Pai, P. Chen, S. Sastry, and S. Wicker, Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference
DOI : 10.1109/GLOCOM.2007.245

A. D. Wood, L. Fang, J. A. Stankovic, and T. He, SIGF, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, 2006.
DOI : 10.1145/1180345.1180351

B. Blum, T. He, S. Son, and J. Stankovic, Igf : A state-free robust communication protocol for wireless sensor networks, pp.2003-2014, 2003.

L. Lovasz, Random walks on graphs : A survey, 1993.

R. Motwani and P. Raghavan, Markov Chains and Random Walks, p.127160, 1995.
DOI : 10.1017/CBO9780511814075.007

L. Rodero-merino, A. F. Anta, L. Lopez, and V. C. , Performance of random walks in one-hop replication networks, Computer Networks, vol.54, issue.5, p.781796, 2010.
DOI : 10.1016/j.comnet.2009.10.006

C. Thomassen, Resistences and currents in innite electrical networks, J. Comb. Theory, p.87102, 1990.

R. S. Finch, Pólya's random walk constant, Mathematical Constants, p.322331, 2003.

D. Aldous and J. Fill, Reversible Markov Chains and Random Walks on Graphs, 2002.

P. Diaconis, Group representations in probability and statistics, Inst. of Math. Statistics, 1988.

J. Friedman, On the second eigenvalue and random walks in randomd-regular graphs, Combinatorica, vol.62, issue.3, p.331362, 1991.
DOI : 10.1007/BF01275669

G. Slade, The self-avoiding walk: A brief survey, Surveys in Stochastic Processes Proceedings of the Thirty-third SPA Conference, 2009.
DOI : 10.4171/072-1/9

K. Altisen, S. Devismes, A. Gerbaud, and P. Lafourcade, Analysis of Random Walks Using Tabu Lists, 19th International Colloquium of Structural Information and Communication Complexity (SIROCCO), 2012.
DOI : 10.1007/978-3-642-31104-8_22

R. Beraldi, Service siscovery in manet via biased random walks, Autonomics, 2007.

R. Berald, R. Baldoni, and R. Prakash, A Biased Random Walk Routing Protocol for Wireless Sensor Networks: The Lukewarm Potato Protocol, IEEE Transactions on Mobile Computing, vol.9, issue.11, 2010.
DOI : 10.1109/TMC.2010.131

P. Trimintzios, Measurement frameworks and metrics for resilient networks and services, European Network and Information Security Agency (ENISA), 2011.

F. Xing and W. Wang, Analyzing resilience to node misbehaviors in wireless multihop networks, Wireless Communications and Networking Conference

D. J. Rosenkrantz, S. Goel, S. S. Ravi, and J. Gangolly, Structure-Based Resilience Metrics for Service-Oriented Networks, IEEE Transactions on Services Computing, vol.2, issue.3, p.183196, 2009.
DOI : 10.1007/11408901_26

A. Jabba, H. Narra, and J. P. Sterbenz, An approach to quantifying resilience in mobile ad hoc networks, Design of Reliable Communication Networks (DRCN)

E. Koller, Encyclopedic Dictionary of the Materials Science, Dunod, 2008.

A. M. Madni and S. Jackson, Toward a conceptual framework for resilience engineering, IEEE Systems Journals, vol.3, issue.2, p.181191, 2009.

T. R. Farley and C. J. Colbourn, Multiterminal resilience for series-parallel networks, Networks, vol.13, issue.2, p.164172, 2007.
DOI : 10.1002/net.20186

W. Najjar and J. Gaudiot, Network resilience: a measure of network fault tolerance, IEEE Transactions on Computers, vol.39, issue.2, p.174181, 1990.
DOI : 10.1109/12.45203

X. Li and D. Yang, A quantitative survivability evaluation model for wireless sensor networks, IEEE International Conference on Networking, Sensing and Control, 2006.

H. Yang, Y. Yuan, S. Lu, and W. Arbaugh, Toward resilient security in wireless sensor networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, 2005.
DOI : 10.1145/1062689.1062696

J. P. Sterbenz, D. Hutchison, E. K. Cetinkaya, A. Jabbar, J. P. Rohrer et al., Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, Computer Networks, vol.54, issue.8, p.12451265, 2010.
DOI : 10.1016/j.comnet.2010.03.005

P. Cholda, A. Mykkeltveit, B. E. Helvik, O. J. Wittner, and A. Jajszczyk, A survey of resilience dierentiation frameworks in communication networks, IEEE Communications Surveys & Tutorials, vol.9, issue.4, p.3255, 2007.

M. Lima, A. Santos, and G. Pujolle, A survey of survivability in mobile ad hoc networks, IEEE Communications Surveys & Tutorials, vol.11, issue.1, p.13, 2009.
DOI : 10.1109/SURV.2009.090106

URL : https://hal.archives-ouvertes.fr/hal-01168681

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, p.1133, 2004.
DOI : 10.1109/TDSC.2004.2

J. Laprie, DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., 1985.
DOI : 10.1109/FTCSH.1995.532603

Y. Deswarte and D. Powell, Internet Security: An Intrusion-Tolerance Approach, Proceedings of the IEEE, 2006.
DOI : 10.1109/JPROC.2005.862320

J. Lu and F. Valois, Modélisation stochastique de réseaux radio, 2005.

C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed diusion : a scalable and robust communication paradigm for sensor networks, Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000.

A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister et al., Rpl : Ipv6 routing protocol for low-power and lossy networks, 2012.

B. D. Hugues, Random walks and random environments, p.119121, 1995.

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, p.382401, 1982.
DOI : 10.1145/357172.357176

A. Kountouris, O. Erdene-ochir, M. Minier, and F. Valois, Methode resiliente a la presence des noeuds compromis pour la determination des routes par un protocole de routage dans un reseau, 2011.

D. Wagner, Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, 2004.
DOI : 10.1145/1029102.1029116

J. Dong, R. Curtmola, and C. Nita-rotaru, Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, p.17901801, 2009.
DOI : 10.1016/j.comcom.2009.07.010