M. Omar, Y. Challal, and A. Bouabdallah, Certification-based trust models in mobile ad hoc networks: A survey and taxonomy, Journal of Network and Computer Applications, vol.35, issue.1, pp.268-286, 2012.
DOI : 10.1016/j.jnca.2011.08.008

URL : https://hal.archives-ouvertes.fr/hal-00644491

M. Omar, Y. Challal, and A. Bouabdallah, Reliable and fully distributed trust model for mobile ad hoc networks, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009.
DOI : 10.1016/j.cose.2008.11.009

M. Omar, Y. Challal, and A. Bouabdallah, NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007.
DOI : 10.1109/SECCOM.2007.4550299

URL : https://hal.archives-ouvertes.fr/hal-00390511

S. Hattahet, Worms propagation and detection in Peer-to-Peer networks, Thèse de doctorat, 2011.

S. Hatahet, A. Bouabdallah, and Y. , A New Worm Propagation Threat in BitTorrent : Modeling and Analysis, Telecommunication Systems, vol.45, pp.2-3, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00390099

S. Hatahet, Y. Challal, and A. Bouabdallah, BitTorrent Worm Sensor Network : P2P Worms Detection and Containment, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing, 2009.
DOI : 10.1109/PDP.2009.61

URL : https://hal.archives-ouvertes.fr/hal-00390059

A. Babakhouya, Y. Challal, A. Bouabdallah, and S. Gharout, S-DV: A new approach to Secure Distance Vector routing protocols, 2006 Securecomm and Workshops, p.6, 2006.
DOI : 10.1109/SECCOMW.2006.359578

W. Bechkit, A. Bouabdallah, and Y. Challal, Enhancing resilience of probabilistic key predistribution schemes for WSNs through hash chaining, ACM-CCS, pp.642-644, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00541546

W. Bechkit, Y. Challal, A. Bouabdallah, and A. Bencheikh, An efficient and highly resilient key management scheme for wireless sensor networks, IEEE Local Computer Network Conference, pp.220-223, 2010.
DOI : 10.1109/LCN.2010.5735705

URL : https://hal.archives-ouvertes.fr/hal-00542541

W. Bechkit, A. Bouabdallah, and Y. Challal, A New Highly Scalable Key Pre-distribution Scheme for WSN
URL : https://hal.archives-ouvertes.fr/hal-00783823

W. Bechkit, Y. Challal, and A. Bouabdallah, A New Scalable Key Pre-Distribution Scheme for WSN, 2012 21st International Conference on Computer Communications and Networks (ICCCN), 2012.
DOI : 10.1109/ICCCN.2012.6289269

URL : https://hal.archives-ouvertes.fr/hal-00710086

J. D. Key, Some Applications of Magma in Designs and Codes: Oval Designs, Hermitian Unitals and Generalized Reed???Muller Codes, Journal of Symbolic Computation, vol.31, issue.1-2, pp.37-53, 2001.
DOI : 10.1006/jsco.1999.1007

B. Maala, Y. Challal, and A. Bouabdallah, HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks, IFIP WSAN, vol.264, pp.125-136, 2008.
DOI : 10.1007/978-0-387-09441-0_11

B. Maala, Y. Challal, H. Bettahar, and A. Bouabdallah, Node capture attack impact on key management schemes for heterogeneous wireless sensor networks, 2009 Global Information Infrastructure Symposium, 2009.
DOI : 10.1109/GIIS.2009.5307034

Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, and A. Hadjidj, Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks, Journal of Network and Computer Applications, vol.34, issue.4, pp.1380-1397, 2011.
DOI : 10.1016/j.jnca.2011.03.022

URL : https://hal.archives-ouvertes.fr/hal-00593778

L. Khelladi, Y. Challal, A. Bouabdallah, and N. , Badache ; « On Security Issues in Embedded Systems : Challenges and Solutions, Int. J. of Information and Computer Security (Inderscience), vol.2, issue.2, 2008.

A. Hadjidj, A. Bouabdallah, and Y. Challal, HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks, 2010.
DOI : 10.1007/s11276-005-6612-9

URL : https://hal.archives-ouvertes.fr/hal-00648882

M. Bagaa, N. Laslaa, A. Ouadjaout, and Y. , SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks, 32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007.
DOI : 10.1109/LCN.2007.81

M. Bagaa, Y. Challal, A. Ouadjaout, N. Lasla, and N. Badache, Efficient data aggregation with innetwork integrity control for WSN, Journal of Parallel and Distributed Computing
URL : https://hal.archives-ouvertes.fr/hal-00723853

A. Hadjidj, A. Bouabdallah, and Y. , Rehabilitation supervsision using wireless sensor networks, pp.1-3, 2011.

A. Hadjidj, Y. Challal, and A. Bouabdallah, Toward a high-fidelity wireless sensor network for rehabilitation supervision, 2011 IEEE 36th Conference on Local Computer Networks, pp.462-469, 2001.
DOI : 10.1109/LCN.2011.6115507

URL : https://hal.archives-ouvertes.fr/hal-00648804

J. A. Guerrero, Y. Challal, and P. Castillo, Impact of Wireless Medium Access Protocol on the Quadrotor Formation Control, Chapter, vol.49, issue.7, 2012.
DOI : 10.1002/9781118387191.ch12

URL : https://hal.archives-ouvertes.fr/hal-00662820

J. A. Guerrero, P. Castillo, and Y. , Trajectory Tracking for a Group of Mini Rotorcraft Flying in Formation, IFAC World Congress, 2011.
DOI : 10.3182/20110828-6-IT-1002.03504

URL : https://hal.archives-ouvertes.fr/hal-00980380

A. Babakhouya, Y. Challal, A. Bouabdallah, and S. Gharout, Securing Distance Vector Routing Protocols for Hybrid Wireless Mesh Networks, 2010.

O. Vermesan, Internet of Things Strategic Research Roadmap, Cluster of European Research Projects on the Internet of Things, 2011.

L. Wood, Today, the Internet, tomorrow?the Internet of Things, ComputerWorld, 2011.

R. Mcmillan and «. Power, http://www.computerworld.com/s/article Six rising threats from cybercriminals, ComputerWorld ComputerWorld, vol.36, 2009.

C. P. Mayer, Security and Privacy Challenges in the Internet of Things, Electronic Communications of the EASST, vol.17, pp.1-12, 2009.

T. Polk and S. Turner, Security Challenges for the Internet of Things, Workshop on Interconnecting Smart Objects with the Internet, 2011.

I. F. Blake, G. Seroussi, and N. P. Smart, Advances in Elliptic Curve Cryptography [43] M. Passing and F. Dressler, « Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes, 3rd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS), pp.882-887, 2005.

K. J. Choi and J. Song, Investigation of feasible cryptographic algorithms for wireless sensor network, Proceedings of the 8th international conference on advanced communication technology, 2006.

J. Deng, C. Hartung, R. Han, and S. Mishra, A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks, Proc First IEEE Int'l Conf Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), 2005.

Y. Challal, Sécurité dans les communications de groupe, Thèse de doctorat, 2005.

K. Das, IPv6 and Wireless Sensor Networks/articles/sensors/IPv6- Sensor-Networks.htm [52] IETF 6LowPAN Working Group

N. Kushalnagar, G. Montenegro, and C. Schumacher, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, 2007.
DOI : 10.17487/rfc4919

G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007.
DOI : 10.17487/rfc4944

J. Hui and P. Thubert, Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks, IETF RFC, vol.6282, 2011.
DOI : 10.17487/rfc6282

T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui et al., RPL: IPv6 Routing Protocol for Low power and Lossy Networks, IETF Draft, p.19, 2011.
DOI : 10.17487/rfc6550

T. Tsao, R. Alexander, M. Dohler, V. Daza, and A. Lozano, A Security Framework for Routing over Low Power and Lossy Networks " , IETF Draft, draft-ietf-roll-security-framework-06, 2011.

R. Greenstadt and J. Beal, Cognitive security for personal devices, Proceedings of the 1st ACM workshop on Workshop on AISec, AISec '08, 2008.
DOI : 10.1145/1456377.1456383

K. Kang and S. H. Son, Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems, proc. of 12th IEEE International Conference on Embedded and Real- Time Computing Systems and Applications, pp.183-189, 2006.

L. Kiely and T. Benzel, Systemic Security Management, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.74-77, 2006.
DOI : 10.1109/MSP.2006.167

. Rajani-muraleedharan and . Sreekumaridevi, Cognitive security framework for heterogeneous sensor network using swarm intelligence, 2011.

A. The and . Project, Automated Validation of Internet Security Protocols and Applications

I. Recommendation and X. Iso, IEC 9594-8, « Public-Key and Attribute Certificate Frameworks, 2001.

S. Buchegger and J. Y. Le-boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, 2002.
DOI : 10.1145/513800.513828

E. Ayday and F. Fekri, A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks, Ad Hoc Networks, pp.181-192, 2010.
DOI : 10.1016/j.adhoc.2009.07.001

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of 6th IFIP Communication and Multimedia Security Conference, 2002.
DOI : 10.1007/978-0-387-35612-9_9

Q. He, D. Wu, and P. Khosla, SORI : a secure and objective reputation-based incentive scheme for ad-hoc networks, Proceedings of IEEE WCNC'04, 2004.

N. Marchanga and R. Dattab, Collaborative techniques for intrusion detection in mobile ad-hoc networks, Ad Hoc Networks, 2008.
DOI : 10.1016/j.adhoc.2007.04.003

H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. S. Fallah, A secure credit-based cooperation stimulating mechanism for MANETs using hash chains, Future Generation Computer Systems, vol.25, issue.8, 2009.
DOI : 10.1016/j.future.2008.12.002

C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks, Ad Hoc Networks, 2009.
DOI : 10.1016/j.adhoc.2008.10.003

M. Ge, K. Y. Lam, D. Gollmann, S. L. Chung, C. C. Chang et al., A robust certification service for highly dynamic MANET in emergency tasks, International Journal of Communication Systems, vol.5, issue.1, 2009.
DOI : 10.1002/dac.1015

L. Zhou and Z. Haas, Securing Ad hoc Networks, IEEE Network, vol.3, issue.6, pp.24-30, 1999.

S. Capkun, L. Buttyan, and J. Hubaux, Small Worlds in Security Systems -an Analysis of the PGP Certificate Graph, Proceedings of New Security Paradigms Workshop (ACM), 2002.

S. Capkun, L. Buttyan, and J. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, pp.52-64, 2003.
DOI : 10.1109/TMC.2003.1195151

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Raghani, D. Toshniwal, and R. Joshi, Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks, 2006 International Conference on Hybrid Information Technology, 2006.
DOI : 10.1109/ICHIT.2006.253522

S. Yi and R. Kravets, MOCA -Mobile Certificate Authority for Wireless Ad hoc Networks, Proceedings of the Second Annual PKI Research Workshop, 2003.

J. Luo, J. Hubaux, and P. Eugster, DICTATE -Distributed Certification Authority with Probabilistic Freshness for Ad hoc Networks, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.4, pp.311-323, 2005.

Y. Kitada, Y. Arakawa, K. Takemori, A. Watanabe, and I. Sasase, On demand distributed public key management using routing information for wirelss ad hoc networks, IEICE Transactions on Information and Systems, vol.881, pp.10-1571, 2005.

G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, and G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, vol.2010, issue.1, 2010.
DOI : 10.1145/1189740.1189741

URL : http://doi.org/10.1155/2010/243985

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 1979.
DOI : 10.1145/359168.359176

M. Hwang, E. Lu, and I. C. Lin, A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, vol.15, issue.6, 2003.

J. Mikovik, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Machanisms, 2005.

D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, Denial-of-service resilience in peer-to-peer file sharing systems, ACM SIGMETRICS Performance Evaluation Review, vol.33, issue.1, pp.38-49, 2005.
DOI : 10.1145/1071690.1064218

S. Staniford, V. Paxson, and N. Weaver, How to 0wn the internet in your spare time, Proceedings of the 11th USENIX Security Symposium, 2002.

W. Yu, C. Boyer, S. Chellappan, and D. Xuan, Peer-to-peer system-based active worm attacks: Modeling, analysis and defense, IEEE International Conference on Communications, ICC, pp.295-300, 2005.
DOI : 10.1016/j.comcom.2008.08.008

N. Khiat, Y. Charlinet, and N. Agoulmine, The emerging threat of peer-to-peer worms, Proc. 1st EEE Workshop on Monitoring, Attack Detection and Mitigation, pp.1-3, 2006.

A. Ramachandran, N. Feamster, and D. Dagon, Revealing botnet membership using dnsbl counter-intelligence, USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06), 2006.
DOI : 10.1007/978-0-387-68768-1_7

A. Karasaridis, B. Rexroad, and D. Hoeflin, Wide-scale botnet detection and characterization, USENIX Workshop on Hot Topics in Understanding Botnets (HotBots' 07), 2007.

J. Morparia, Peer-to-Peer Botnets: Analysis and Detection, 2008.

J. Douceur, The Sybil Attack, Proceedings of First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

J. Chan, C. Leckie, and T. Peng, Hitlist worm detection using source ip address history, Proceedings of Australian Telecommunication Networks and Applications Conference, 2006.

E. Koutrouli and A. Tsalgatidou, Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework, Trust and Privacy in Digital Business, pp.152-161, 2006.
DOI : 10.1007/11824633_16

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

B. N. Levine, C. Shields, and N. B. Margolin, A survey of solutions to the sybil attack, 2006.

J. Kubiatowicz, OceanStore, ACM SIGARCH Computer Architecture News, vol.28, issue.5, pp.190-201, 2000.
DOI : 10.1145/378995.379239

B. Pretre, Attacks on peer-to-peer networks, 2005.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, p.21, 2004.

C. Buragohain, D. Agrawal, and S. Suri, A game theoretic framework for incentives in P2P systems, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003), 2003.
DOI : 10.1109/PTP.2003.1231503

S. Androutsellis-theotokis and D. Spinellis, A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, vol.36, issue.4, p.371, 2004.
DOI : 10.1145/1041680.1041681

L. Zhou, L. Zhang, F. Mcsherry, N. Immorlica, M. Costa et al., A first look at peer-topeer worms: Threats and defenses, 4th International Workshop on Peer-to-Peer Systems, pp.24-35, 2005.
DOI : 10.1007/11558989_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Mochalski and H. Schulze, Internet study, 2008.

F. Csi, Crime and Security Survey, FBI CSI Report, 2010.

B. Cohen, Incentives build robustness in bittorrent In Workshop on Economics of Peer-to- Peer systems, 2003.

C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers, Proc. of the conference on Communications, Architectures, Protocols, and Applications, pp.234-344, 1994.

R. Perlman, Network Layer Protocols with Byzantine Robustness, 1988.

T. Wan, E. Kranakis, P. C. Van-oorschot, and . Spain, Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV), Proceedings of the 6th International Conference on Information and Communications Security, pp.358-374, 2004.
DOI : 10.1007/978-3-540-30191-2_28

F. Daia and J. Wub, On constructing k-connected k-dominating set in wireless ad hoc and sensor networks, Journal of Parallel and Distributed Computing, vol.66, issue.7, pp.947-958, 2006.
DOI : 10.1016/j.jpdc.2005.12.010

H. Nakayama, N. Ansari, A. Jamalipour, and N. Kato, Fault-resilient sensing in wireless sensor networks, Computer Communications, vol.30, issue.11-12, pp.11-12, 2007.
DOI : 10.1016/j.comcom.2007.04.023

M. Larrea, C. Martîn, and J. Et-astrain, Coordinated Data Aggregation in Wireless Sensor Networks using the Omega Failure Detector. the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks PE-WASUN '06. Terromolinos, Espagne, pp.114-122, 2006.

L. Hu and D. Evans, Secure aggregation for wireless networks, Ad Hoc Networks, 2003.

M. Bagaa, N. Lasla, A. Ouadjaout, and Y. Challal, SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks, 32nd IEEE Conference on Local Computer Networks (LCN 2007), pp.1053-1060, 2007.
DOI : 10.1109/LCN.2007.81

K. Wua, D. Dreefa, B. Sunb, and Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2006.
DOI : 10.1016/j.adhoc.2006.05.009

A. Mahimkar, T. S. Rappaport, and . Securedav, SecureDAV: a secure data aggregation and verification protocol for sensor networks, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.2175-2179, 2004.
DOI : 10.1109/GLOCOM.2004.1378395

J. Deng, R. Han, and S. , INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, vol.29, issue.2, pp.216-230, 2006.
DOI : 10.1016/j.comcom.2005.05.018

URL : http://libres.uncg.edu/ir/uncg/f/J_Deng_INSENS_2006.pdf

J. Yin and S. Madria, SecRout: a secure routing protocol for sensor networks, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.393-398, 2006.
DOI : 10.1109/AINA.2006.297

S. Lee and Y. Choi, A secure alternate path routing in sensor networks, Computer Communications, vol.30, issue.1, pp.153-165, 2006.
DOI : 10.1016/j.comcom.2006.08.006

J. Deng, R. Han, and S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks , SASN '05, pp.89-96, 2005.
DOI : 10.1145/1102219.1102235

S. Zhu, S. Setia, S. Jajodia, and P. Ning, Interleaved hop-by-hop authentication against false data injection attacks in sensor networks, ACM Transactions on Sensor Networks, vol.3, issue.3, 2007.
DOI : 10.1145/1267060.1267062

F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical En-route Filtering of Injected False Data in Sensor Networks, IEEE INFOCOM, vol.4, pp.2446-2457, 2004.

W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks: attack and defense strategies, IEEE.Network, vol.20, pp.41-47, 2006.

A. Wood and J. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, pp.48-56, 2002.
DOI : 10.1109/MC.2002.1039518

D. Liu and P. Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS '03, pp.52-61, 2003.

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002.
DOI : 10.1145/586110.586117

H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, 2003.

W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, IEEE INFOCOM'04, pp.586-597, 2004.

C. Castelluccia and A. Spognardi, A Robust Key Predistribution Protocol for Multi-Phase Wireless Sensor Networks, IEEE Securecom'07, pp.351-360, 2007.

Z. Yu and Y. Guan, A robust group-based key management scheme for wireless sensor networks, Wireless Communications and Networking Conference, pp.1915-1920, 2005.

S. Zhu, S. Setia, and S. Jajodia, Leap: efficient security mechanisms for large-scale distributed sensor networks, ACM CCS '03, pp.62-72, 2003.

S. A. Camtepe and B. Yener, Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, IEEE/ACM Transactions on Networking, vol.15, issue.2, pp.346-358, 2007.
DOI : 10.1109/TNET.2007.892879

S. Ruj, A. Nayak, and I. Stojmenovic, Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs, 2011 Proceedings IEEE INFOCOM, pp.326-330, 2011.
DOI : 10.1109/INFCOM.2011.5935175

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001.
DOI : 10.1145/381677.381696

B. L. Titzer, D. K. Lee, and J. Palsberg, Avrora: scalable sensor network simulation with precise timing, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., 2005.
DOI : 10.1109/IPSN.2005.1440978

J. Brown, X. Du, and K. Nygrad, An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007.
DOI : 10.1109/GLOCOM.2007.191

P. Levis, N. Lee, M. Welsh, and D. Culler, TOSSIM, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, 2003.
DOI : 10.1145/958491.958506

X. Du, Y. Xiao, M. Guizani, and H. Chen, An effective key management scheme for heterogenous sensor networks, Ad Hoc Networks, pp.24-34, 2007.

A. Bencheikh, Y. Challal, A. Balla, and A. Bouabdallah, Sécurisation du protocole Tiny Diffusion, 2010.

C. Intanagonwiwat, R. Govindan, and D. , Estrin, «Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks», ACM MobiCom, 2000.

A. Barabasi and A. R. , Emergence of scaling in random networks, Science, vol.286, pp.509-512, 1999.

W. Lou and Y. Kwon, H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks, IEEE Transactions on Vehicular Technology, vol.55, issue.4, pp.1320-1330, 2006.
DOI : 10.1109/TVT.2006.877707

S. K. Wua, D. Dreefa, B. Sunb, and Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, vol.5, issue.1, pp.100-111, 2006.
DOI : 10.1016/j.adhoc.2006.05.009

S. L. Hu and D. Evans, Secure aggregation for wireless networks, Ad Hoc Networks, 2003.

R. H. Alzaid, E. Foo, and J. Nieto, RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.419-424, 2008.
DOI : 10.1109/PDCAT.2008.52

A. Securedav, T. Mahimkar, and . Rappaport, SecureDAV: A secure data aggregation and verification protocol for sensor networks, Proceedings of the IEEE Global Telecommunications Conference, 2004.

C. C. Castelluccia, E. Mykletun, and G. Tsudik, E_cient aggregation of encrypted data in wireless sensor networks, Mobile and Ubiquitous Systems: Networking and Services, pp.109-117, 2005.

A. R. Bista, K. Jo, and J. Chang, A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.394-399, 2009.
DOI : 10.1109/DASC.2009.77

E. Sumagg, S. Mlaih, and . Aly, Secure hop-by-hop aggregation of end-toend concealed data in wireless sensor networks, IEEE INFOCOM Workshops, pp.1-6, 2008.

V. Shnayder, M. Hempstead, B. Chen, G. W. Allen, and M. Welsh, Simulating the power consumption of large-scale sensor network applications, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, pp.188-200, 2004.
DOI : 10.1145/1031495.1031518

Y. Challal, S. Gharout, A. Bouabdallah, and H. Bettahar, Adaptive clustering for scalable key management in dynamic group communications, International Journal of Security and Networks, vol.3, issue.2, 2008.
DOI : 10.1504/IJSN.2008.017226

URL : https://hal.archives-ouvertes.fr/hal-00335532

S. Gharout, Y. Challal, and A. Bouabdallah, Scalable Delay-constrained Multicast Group Key Management, Int. J. of Network Security, vol.7, issue.2, pp.153-167, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00389027

H. R. Hassan, A. Bouabdallah, H. Bettahar, and Y. , Key management for content access control in a hierarchy, Computer Networks, vol.51, issue.11, pp.3197-3219, 2007.
DOI : 10.1016/j.comnet.2006.12.011

URL : https://hal.archives-ouvertes.fr/hal-00335536

Y. Challal, A. Bouabdallah, and Y. Hinard, RLH: receiver driven layered hash-chaining for multicast data origin authentication, Computer Communications, vol.28, issue.7, pp.726-740, 2005.
DOI : 10.1016/j.comcom.2004.10.009

Y. Challal, A. Bouabdallah, and H. Bettahar, H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming, Computers & Security, vol.24, issue.1, p.5768, 2005.
DOI : 10.1016/j.cose.2004.06.012

Y. Challal, H. Bettahar, and A. Bouabdallah, SAKM, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.55-70, 2004.
DOI : 10.1145/997150.997157

URL : https://hal.archives-ouvertes.fr/hal-00339986

Y. Law, L. Van-hoesel, J. Doumen, P. Hartel, and P. Havinga, Energy-Efficient Link-Layer Jamming Attacks against Three Wireless Sensor Network MAC Protocols, Proceedings of ACM SASN, 2005.
DOI : 10.1145/1464420.1464426

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks: attack and defense strategies, IEEE.Network, vol.20, issue.3, pp.41-47, 2006.

S. Deering and R. Hinden, Version 6 (IPv6) Specification », IETF RFC2460, 1998.
DOI : 10.17487/rfc1883