W. Li, F. Bassi, D. Dardari, M. Kieffer, and G. Pasolini, Low-complexity distributed fault detection for wireless sensor networks, 2015 IEEE International Conference on Communications (ICC), pp.6712-6718
DOI : 10.1109/ICC.2015.7249395

URL : https://hal.archives-ouvertes.fr/hal-01260552

W. Li, F. Bassi, D. Dardari, M. Kieffer, and G. Pasolini, Iterative distributed outlier detection for wireless sensor networks: Equilibrium and convergence analysis, 2015 54th IEEE Conference on Decision and Control (CDC), pp.3050-3056, 2015.
DOI : 10.1109/CDC.2015.7402677

URL : https://hal.archives-ouvertes.fr/hal-01327824

W. Li, F. Bassi, D. Dardari, M. Kieffer, and G. Pasolini, Impact of channel access issues and packet losses on distributed outlier detection within wireless sensor networks, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016.
DOI : 10.1109/ICASSP.2016.7472377

URL : https://hal.archives-ouvertes.fr/hal-01327784

W. Li, F. Bassi, and M. Kieffer, Sparse random linear network coding for data compression in WSNs, 2016 IEEE International Symposium on Information Theory (ISIT), 2016.
DOI : 10.1109/ISIT.2016.7541795

URL : https://hal.archives-ouvertes.fr/hal-01327498

W. Li, L. Galluccio, M. Kieffer, and F. Bassi, Distributed Faulty Node Detection in DTNs, 2016 25th International Conference on Computer Communication and Networks (ICCCN)
DOI : 10.1109/ICCCN.2016.7568511

URL : https://hal.archives-ouvertes.fr/hal-01327802

W. Li, F. Bassi, L. Galluccio, and M. Kieffer, Self-rating in a community of peers, 2016 IEEE 55th Conference on Decision and Control (CDC), 2016.
DOI : 10.1109/CDC.2016.7799175

URL : https://hal.archives-ouvertes.fr/hal-01327792

. [. Bibliography, S. Audibert, and . Bubeck, Best arm identification in multi-armed bandits, COLT- 23th Conf. on Learning Theory, 2010.

F. [. Ayday and . Fekri, An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks, IEEE Transactions on Mobile Computing, vol.11, issue.9, pp.1514-1531, 2012.
DOI : 10.1109/TMC.2011.160

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.2581

]. R. Ahl+00 and . Ahlswede, Network information flow, IEEE Trans. Inf. Theory, vol.46, pp.1204-1216, 2000.

]. H. Ang+09 and . Ang, Communication-efficient classification in P2P networks, Proc. Joint European Conf. on Machine Learning and Knowledge Discovery in Databases, pp.83-98, 2009.

]. S. Ban22 and . Banach, Sur les opérations dans les ensembles abstraits et leur application aux équations intégrales, In: Fund. Math, vol.31, pp.133-181, 1922.

]. F. Bas+12 and . Bassi, Compressive linear network coding for efficient data collection in wireless sensor networks, Proc. 20th European Signal Processing Conf. (EUSIPCO)

B. [. Belforte, V. Bona, and . Cerone, Parameter estimation algorithms for a setmembership description of uncertainty, In: Automatica, vol.265, pp.887-898, 1990.

T. [. Barnett, A. Lewis, and . Montanari, Outliers in statistical data The Dynamics of Message Passing on Dense Graphs, with Applications to Compressed Sensing, IEEE Trans. Inf. Theory, vol.3, issue.572, pp.764-785, 1994.

]. J. Bra+13 and . Branch, In-network outlier detection in wireless sensor networks, Knowledge and information systems, vol.341, pp.23-54, 2013.

S. [. Baron, R. G. Sarvotham, and . Baraniuk, Bayesian Compressive Sensing Via Belief Propagation, IEEE Transactions on Signal Processing, vol.58, issue.1, pp.269-280, 2010.
DOI : 10.1109/TSP.2009.2027773

URL : http://arxiv.org/abs/0812.4627

N. [. Bourtsoulatze, P. Thomos, and . Frossard, Correlation-aware reconstruction of network coded sources, 2012 International Symposium on Network Coding (NetCod), pp.91-96, 2012.
DOI : 10.1109/NETCOD.2012.6261890

M. Cheraghchi, Group Testing With Probabilistic Tests: Theory, Design and Application, IEEE Transactions on Information Theory, vol.57, issue.10, pp.7057-7067, 2011.
DOI : 10.1109/TIT.2011.2148691

]. A. Chi+11 and . Chiuso, Gossip algorithms for simultaneous distributed estimation and classification in sensor networks, IEEE Journal of Selected Topics in Signal Processing, vol.54, pp.691-706, 2011.

J. Choi, A distributed adaptive scheme for detecting faults in wireless sensor networks, WSEAS Transactions on Communications, vol.8, issue.2, pp.269-278, 2009.

S. [. Chen, A. Kher, and . Somani, Distributed fault detection of wireless sensor networks, Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks , DIWANS '06, pp.65-72, 2006.
DOI : 10.1145/1160972.1160985

J. [. Candes, T. Romberg, and . Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information, IEEE Transactions on Information Theory, vol.52, issue.2, pp.489-509, 2006.
DOI : 10.1109/TIT.2005.862083

URL : http://arxiv.org/abs/math/0409186

]. I. Csi82 and . Csiszar, Linear codes for sources and source networks: Error exponents, universal coding, IEEE Trans. Inf. Theory, vol.284, pp.585-592, 1982.

]. I. Csi98 and . Csiszar, The Method of Types, IEEE Trans. Inf. Theory, vol.446, pp.2505-2523, 1998.

T. [. Candes and . Tao, Decoding by Linear Programming, IEEE Transactions on Information Theory, vol.51, issue.12, pp.4203-4215, 2005.
DOI : 10.1109/TIT.2005.858979

URL : http://arxiv.org/abs/math/0502327

]. E. Ct06a, T. Candes, and . Tao, Near optimal signal recovery from random projections: Universal encoding strategies, IEEE Trans. Inf. Theory, vol.52, pp.5406-5425, 2006.

J. [. Cover and . Thomas, Elements of information theory, 2012.

Y. [. Chou, K. Wu, and . Jain, Practical network coding, Proc. 41-st Allerton Conf. Monticello, IL, 2003.

[. Du and F. K. Hwang, Combinatorial group testing and its applications, World Scientific, 1993.
DOI : 10.1142/4252

]. A. Dim+10 and . Dimakis, Gossip algorithms for distributed signal processing, Proceedings of the IEEE 98, pp.1847-1864, 2010.

M. Ding, Localized fault-tolerant event boundary detection in sensor networks, Proc IEEE INFOCOM, pp.902-913, 2005.

S. [. Draper and . Malekpour, Compressed sensing over finite fields, 2009 IEEE International Symposium on Information Theory
DOI : 10.1109/ISIT.2009.5205666

H. Dong, A Survey on Distributed Filtering and Fault Detection for Sensor Networks, Mathematical Problems in Engineering, vol.2014, 2014.
DOI : 10.1080/21642583.2013.804463

]. D. Don06 and . Donoho, Compressed sensing, IEEE Trans. Inf. Theory, vol.52, pp.1289-1306, 2006.

]. J. Dou02 and . Douceur, The sybil attack " . In: Peer-to-peer Systems, pp.251-260, 2002.

[. Paola, Adaptive Distributed Outlier Detection for WSNs, IEEE Transactions on Cybernetics, vol.45, issue.5, pp.888-899, 2015.
DOI : 10.1109/TCYB.2014.2338611

A. [. Eagle and . Pentland, Reality mining: sensing complex social systems " . In: Personal and ubiquitous computing 10, pp.255-268, 2006.
DOI : 10.1007/s00779-005-0046-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.9752

S. [. Fagnani, C. Fosson, and . Ravazzi, A Distributed Classification/Estimation Algorithm for Sensor Networks, SIAM Journal on Control and Optimization, vol.52, issue.1, pp.189-218, 2014.
DOI : 10.1137/120876873

M. [. Feizi and . Médard, A power efficient sensing/communication scheme: Joint source-channel-network coding by using compressive sensing, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1048-1054
DOI : 10.1109/Allerton.2011.6120283

URL : http://arxiv.org/abs/1110.0428

S. [. Fagnani and . Zampieri, Randomized consensus algorithms over large scale networks, IEEE Journal on Selected Areas in Communications, vol.264, pp.634-649, 2008.
DOI : 10.1109/jsac.2008.080506

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.2322

]. R. Gal68 and . Gallager, Information Theory and Reliable Communication, 1968.

J. [. Granas and . Dugundji, Fixed point theory, 2013.
DOI : 10.1007/978-0-387-21593-8

B. [. Galluccio, S. Lorenzo, and . Glisic, Sociality-Aided New Adaptive Infection Recovery Schemes for Multicast DTNs, IEEE Transactions on Vehicular Technology, vol.65, issue.5, pp.3360-3375, 2016.
DOI : 10.1109/TVT.2015.2450202

]. B. Guo+15 and . Guo, Mobile crowd sensing and computing: the review of an emerging humanpowered sensing paradigm, In: ACM Computing Surveys, vol.481, 2015.

[. Gao, Y. Xu, and X. Li, Weighted-Median Based Distributed Fault Detection for Wireless Sensor Networks, Journal of Software, vol.18, issue.5, pp.1208-1217, 2007.
DOI : 10.1360/jos181208

M. Haenggi, Stochastic geometry and random graphs for the analysis and design of wireless networks, IEEE Journal on Selected Areas in Communications, vol.27, issue.7, pp.1029-1046, 2009.
DOI : 10.1109/JSAC.2009.090902

]. M. Hae12 and . Haenggi, Stochastic geometry for wireless networks, 2012.

Y. Han, A reputation-aware decision-making approach for improving the efficiency of crowdsourcing systems, Proc. International Conf. on Autonomous agents and Multi-agent Systems, pp.1315-1316

G. Han, An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network, IEEE Transactions on Mobile Computing, vol.14, issue.12, pp.2447-2459, 2015.
DOI : 10.1109/TMC.2015.2402120

P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.11-1576, 2011.
DOI : 10.1145/1374618.1374652

J. [. Huang and . Manton, Coordination and Consensus of Networked Agents with Noisy Measurements: Stochastic Algorithms and Asymptotic Behavior, SIAM Journal on Control and Optimization, vol.48, issue.1, pp.134-161, 2009.
DOI : 10.1137/06067359X

R. [. Haupt and . Nowak, Signal Reconstruction From Noisy Random Projections, IEEE Transactions on Information Theory, vol.52, issue.9, pp.4036-4048, 2006.
DOI : 10.1109/TIT.2006.880031

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4085

]. T. Ho+06 and . Ho, A random linear network coding approach to multicast

E. Hernandez-orallo, CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transactions on Mobile Computing, vol.14, issue.6, pp.1162-1175, 2015.
DOI : 10.1109/TMC.2014.2343627

URL : http://hdl.handle.net/10251/63693

L. Iwaza, M. Kieffer, and K. , MAP estimation of network-coded correlated sources, The 2012 International Conference on Advanced Technologies for Communications, pp.199-202, 2012.
DOI : 10.1109/ATC.2012.6404259

URL : https://hal.archives-ouvertes.fr/hal-00780793

]. R. Ise05 and . Isermann, Model-based fault-detection and diagnosis?status and applications, In: Annual Reviews in control, vol.291, pp.71-85, 2005.

M. Jafari, Compressed network coding vectors, 2009 IEEE International Symposium on Information Theory, pp.109-113, 2009.
DOI : 10.1109/ISIT.2009.5206041

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7474

L. Jaulin, Applied Interval Analysis Distributed fault detection for wireless sensor based on weighted average, 2001.

[. Ji, Y. Xue, and L. Carin, Bayesian Compressive Sensing, IEEE Transactions on Signal Processing, vol.56, issue.6, pp.2346-2356, 2008.
DOI : 10.1109/TSP.2007.914345

M. J. Khabbaz, C. M. Assi, and W. F. Fawaz, Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.607-640, 2012.
DOI : 10.1109/SURV.2011.041911.00093

B. [. Kschischang, H. A. Frey, and . Loeliger, Factor graphs and the sum-product algorithm, IEEE Transactions on Information Theory, vol.47, issue.2, pp.498-519, 2001.
DOI : 10.1109/18.910572

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.1570

]. B. Km14a, H. T. Kantarci, and . Mouftah, Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things, IEEE Internet Of Things Journal, vol.1, issue.4, 2014.

B. Kantarci and H. T. Mouftah, Reputation-based sensing-as-a-service for crowd management over the cloud, 2014 IEEE International Conference on Communications (ICC), 2014.
DOI : 10.1109/ICC.2014.6883882

[. Khouzani, S. Sarkar, and E. Altman, Maximum damage malware attack in mobile wireless networks, IEEE/ACM Transactions on Networking, vol.205, pp.1347-1360, 2012.
DOI : 10.1109/infcom.2010.5462150

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.765

F. [. Li, M. Bassi, and . Kieffer, Robust Bayesian compressed sensing over finite fields: asymptotic performance analysis, pp.1401-4313, 2014.

F. [. Li, M. Bassi, and . Kieffer, Sparse random linear network coding for data compression in WSNs, 2016 IEEE International Symposium on Information Theory (ISIT), 2016.
DOI : 10.1109/ISIT.2016.7541795

URL : https://hal.archives-ouvertes.fr/hal-01327498

[. Lee and Y. Choi, Fault detection of wireless sensor networks, Computer Communications, vol.31, issue.14, pp.3469-3475, 2008.
DOI : 10.1016/j.comcom.2008.06.014

M. [. Leinonen, M. Codreanu, and . Juntti, Sequential Compressed Sensing With Progressive Signal Reconstruction in Wireless Sensor Networks, IEEE Transactions on Wireless Communications, vol.14, issue.3, pp.1622-1635, 2015.
DOI : 10.1109/TWC.2014.2371017

]. W. Li+15a and . Li, Iterative distributed outlier detection for wireless sensor networks: Equilibrium and convergence analysis, Proc. IEEE Conf. on Decision and Control (CDC)

W. Li, Low-complexity distributed fault detection for wireless sensor networks, 2015 IEEE International Conference on Communications (ICC), 2015.
DOI : 10.1109/ICC.2015.7249395

URL : https://hal.archives-ouvertes.fr/hal-01260552

]. W. Li+16a and . Li, Defective Sensor Identification for WSNs involving Generic Local Outlier Detection Tests, IEEE Trans. on Signal and Information Processing over Networks, vol.2, issue.1, pp.29-48, 2016.

W. Li, Distributed Faulty Node Detection in DTNs, 2016 25th International Conference on Computer Communication and Networks (ICCCN), 2016.
DOI : 10.1109/ICCCN.2016.7568511

URL : https://hal.archives-ouvertes.fr/hal-01327802

]. W. Li+16c and . Li, Impact of channel access issues and packet losses on distributed outlier detection within wireless sensor networks, Proc. IEEE International Conf. on Acoustics, Speech and Signal Processing (ICASSP). 2016, pp.3746-3750

W. Li, Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis, p.1327472, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01327472

]. W. Li+16e and . Li, Self-Rating in a Community of Peers, p.1327792, 2016.

]. W. Li+16f and . Li, Peer-Assisted Individual Assessment in a Multi-Agent System, p.1349638, 2016.

]. Y. Liu+15 and . Liu, The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities, IEEE Trans. on Mobile Computing, vol.1411, pp.2376-2391, 2015.

C. Lo, Efficient Sensor Fault Detection Using Combinatorial Group Testing, 2013 IEEE International Conference on Distributed Computing in Sensor Systems, pp.199-206
DOI : 10.1109/DCOSS.2013.57

]. P. Luo+07 and . Luo, Distributed classification in peer-to-peer networks, Proc. 13th ACM SIGKDD International Conf. on Knowledge Discovery and Data mining, pp.968-976, 2007.

M. Milanese, Bounding Approaches to System Identification, 1996.
DOI : 10.1007/978-1-4757-9545-5

P. [. Mahapatro and . Khilar, Fault Diagnosis in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.15, issue.4
DOI : 10.1109/SURV.2013.030713.00062

]. A. Mon12 and . Montanari, Graphical models concepts in compressed sensing, Compressed Sensing: Theory and Applications. 2012, pp.394-438

F. [. Nabaee and . Labeau, Quantized Network Coding for correlated sources, EURASIP Journal on Wireless Communications and Networking, vol.2014, issue.1, pp.1-17, 2014.
DOI : 10.1007/BF01386390

URL : http://doi.org/10.1186/1687-1499-2014-40

]. M. Orl and . Orlinski, Encounter traces for the ONE simulator. Downloaded from

M. Panda, Tracking Message Spread in Mobile Delay Tolerant Networks, IEEE Transactions on Mobile Computing, vol.14, issue.8, pp.1737-1750, 2015.
DOI : 10.1109/TMC.2014.2362746

URL : https://hal.archives-ouvertes.fr/hal-01205134

W. Peng, Behavioral Malware Detection in Delay Tolerant Networks, IEEE Trans. on Parallel and Distributed Systems, vol.251, pp.53-63, 2014.

P. [. Panda and . Khilar, Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test, Ad Hoc Networks, pp.170-184, 2015.
DOI : 10.1016/j.adhoc.2014.10.006

K. Rajawat, C. Alfonso, and G. B. Giannakis, Network-Compressive Coding for Wireless Sensors with Correlated Data, Wireless Communications, pp.4264-4274, 2012.
DOI : 10.1109/TWC.2012.102612.111230

J. Ren, SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing, Computer Communications, vol.65, 2015.
DOI : 10.1016/j.comcom.2015.01.022

URL : http://arxiv.org/abs/1411.7416

]. W. Rud64 and . Rudin, Principles of mathematical analysis, 1964.

S. Richard, . Sutton, G. Andrew, and . Barto, Reinforcement learning: An introduction, 1998.

B. Nihar, S. Shah, . Balakrishnan, J. Martin, and . Wainwright, A Permutationbased Model for Crowd Labeling: Optimal Estimation and Robustness, 2016.

J. Scott, CRAWDAD dataset cambridge/haggle (v. 2009-05-29) Downloaded from http, 2009.

]. X. She+13 and . Sheng, Sensing as a Service: challenges, solutions and future directions, IEEE Sensors Journal, vol.13, 2013.

[. Seong and H. Lee, Necessary and Sufficient Conditions for Recovery of Sparse Signals over Finite Fields, IEEE Communications Letters, vol.17, issue.10, pp.1976-1979, 2013.
DOI : 10.1109/LCOMM.2013.090313.130753

J. [. Ngj-soares, F. Rodrigues, and . Farahmand, GeoSpray: A geographic routing protocol for vehicular delay-tolerant networks, Information Fusion, vol.15, pp.102-113, 2014.
DOI : 10.1016/j.inffus.2011.11.003

L. [. Tan, S. C. Balzano, and . Draper, Rank Minimization Over Finite Fields: Fundamental Limits and Coding-Theoretic Interpretations, IEEE Transactions on Information Theory, vol.58, issue.4, pp.2018-2039, 2012.
DOI : 10.1109/TIT.2011.2178017

URL : http://arxiv.org/abs/1104.4302

N. [. Tosic, P. Thomos, and . Frossard, Distributed sensor failure detection in sensor networks, Signal Processing 93, pp.399-410, 2013.

R. Verdone, Wireless sensor and actuator networks: technologies, analysis and design, 2010.

R. W. Yeung, A first course in information theory, NJ, 2004.
DOI : 10.1007/978-1-4419-8608-5

M. [. Yu and . Van-der-schaar, Reputation-based incentive protocols in crowdsourcing applications, Proc. IEEE INFOCOM, pp.2140-2148

H. Zhu, Recognizing Exponential Inter-Contact Time in VANETs, 2010 Proceedings IEEE INFOCOM, pp.1-5
DOI : 10.1109/INFCOM.2010.5462263

]. B. Zhu+12 and . Zhu, Distributed faulty node detection and isolation in delay-tolerant vehicular sensor networks, Proc. PIMRC. 2012, pp.1497-1502

H. Zhu, A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.22-32, 2014.
DOI : 10.1109/TPDS.2013.36

N. [. Zhang, P. Meratnia, and . Havinga, Outlier Detection Techniques for Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.12, issue.2, pp.159-170, 2010.
DOI : 10.1109/SURV.2010.021510.00088