T. {v, E. , and ?. , We reformulate this as P r[Expt Rt S? (A)] ? P r[Expt Rt S? (A saf e )] ? ?, with ? negligible in ? and in ? d . Looking at the experiment, this means that

I. Inputs and W. , 100 4.2.2 Offline inputs, Inputs from the Medium Access Control (MAC) Protocol . . . 102 4.2.5 Data Based on the Routing Layer and Traffic . . . . . . . . . . 103 4.2.6 Inputs Based on the Application Data

M. Vulnerabilities-discovery, 104 4.3.1 Definitions and assumptions Rules and attacker progression, p.115

I. Analysis-of-existing, 116 4.4.1 A Real-Time Node-Based Traffic Anomaly Detection Algorithm, p.116

G. Gergely´acs, L. Buttyán, and I. Vajda, Provably secure ondemand source routing in mobile ad hoc networks, Transactions on Mobile Computing, vol.5, issue.11, pp.1533-1546, 2006.

K. Altisen, S. Devismes, R. Jamet, and P. Lafourcade, Routage sécurisé et résilient pour réseaux de capteurs sans fil, Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel'13), pp.1-4, 2013.

K. Altisen, S. Devismes, R. Jamet, and P. Lafourcade, SR3: Secure resilient reputation-based routing, Distributed Computing in Sensor Systems (DCOSS'13), pp.258-265, 2013.
DOI : 10.1007/s11276-016-1273-4

K. Altisen, S. Devismes, R. Jamet, and P. Lafourcade, SR3 supplementary material, 2013.

J. Nadhem, K. G. Fardan, and . Paterson, Lucky thirteen: Breaking the TLS and DTLS record protocols, Security and Privacy (SP'13), pp.526-540, 2013.

[. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1997.
DOI : 10.1145/266420.266432

R. R. Aleliunas, R. J. Karp, L. Lipton, C. Lovasz, and . Rackoff, Random walks, universal traversal sequences, and the complexity of maze problems, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), pp.218-223, 1979.
DOI : 10.1109/SFCS.1979.34

M. Abadi and P. Rogaway, Reconciling Two Views of Cryptography, IFIP International Conference on Theoretical Computer Science (IFIP TCS'00), pp.3-22, 2000.
DOI : 10.1007/3-540-44929-9_1

[. Anjum and R. Talpade, LiPaD: lightweight packet drop detection for ad hoc networks, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.1233-1237, 2004.
DOI : 10.1109/VETECF.2004.1400219

[. Burrows, M. Abadi, and R. M. Needham, A logic of authentication, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, pp.426233-271, 1871.

[. Basin, Cas Cremers, and Catherine Meadows. Model checking security protocols. Handbook of Model Checking, 2011.

[. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
DOI : 10.1109/SFCS.1997.646128

M. Bellare, A Note on Negligible Functions, Journal of Cryptology, vol.15, issue.4, pp.271-284, 2002.
DOI : 10.1007/s00145-002-0116-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Bfk-+-13-]-karthikeyan-bhargavan, M. Fournet, A. Kohlweiss, P. Pironti, and . Strub, Implementing TLS with verified cryptographic security, Security and Privacy (SP'13), pp.445-459, 2013.

V. Bhuse and A. Gupta, Anomaly intrusion detection in wireless sensor networks, Journal of High Speed Networks, vol.15, issue.1, pp.33-51, 2006.

[. Barr, Z. J. Haas, and R. Van-renesse, JiST: an efficient approach to simulation using virtual machines, Software: Practice and Experience (SPE'05), pp.539-576, 2005.
DOI : 10.1287/ijoc.5.3.213

[. Barr, Z. J. Haas, and R. Van-renesse, Scalable wireless ad hoc network simulation. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks, pp.297-311, 2005.
DOI : 10.1201/9780203323687.ch19

[. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000.
DOI : 10.1006/jcss.1999.1694

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, Advances in Cryptology (ASI- ACRYPT'11), pp.344-371, 2011.
DOI : 10.1007/978-3-642-25385-0_19

B. Blanchet, A Computationally Sound Mechanized Prover for Security Protocols, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.193-207, 2008.
DOI : 10.1109/TDSC.2007.1005

P. Bose, P. Morin, I. Stojmenovi´cstojmenovi´c, and J. Urrutia, wireless networks, Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications , DIALM '99, pp.609-616, 2001.
DOI : 10.1145/313239.313282

]. V. Bon97 and . Bono, 7007 explanation and apology. Appears in NANOG mailing list, 1997.

[. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

S. Kasper-bonne-rasmussen and . Capkun, Implications of radio fingerprinting on the security of sensor networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.331-340, 2007.
DOI : 10.1109/SECCOM.2007.4550352

J. Bellardo and S. Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX Security Symposium (USENIX Security'14), pp.15-28, 2003.

L. Buttyán and T. V. Thong, Formal verification of secure ad-hoc network routing protocols using deductive model-checking, Wireless and Mobile Networking Conference (WMNC'10), pp.1-6, 2010.

J. Cucurull, M. Asplund, and S. Nadjm-tehrani, Anomaly Detection and Mitigation for Disaster Area Networks, Recent Advances in Intrusion Detection (RAID'10), pp.339-359
DOI : 10.1007/978-3-642-15512-3_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.80-89, 2007.
DOI : 10.1145/1288107.1288119

G. Chelius, A. Fraboulet, and E. B. Hamida, WSNet: a modular event-driven wireless network simulator, 2006.

B. Canvel, A. Hiltgen, S. Vaudenay, and M. Vuagnoux, Password Interception in a SSL/TLS Channel, Advances in Cryptology (CRYPTO'03), pp.583-599, 2003.
DOI : 10.1007/978-3-540-45146-4_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC, vol.3626, 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

J. F. Cas, P. Cremers, P. Lafourcade, and . Nadeau, Comparing state spaces in automatic security protocol analysis, Formal to Practical Security, pp.70-94, 2009.

K. Cazorla, M. Marquet, and . Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, International Conference on Security and Cryptography (SECRYPT'13), pp.543-548, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00918974

[. Cowie, A. Ogielski, and D. M. Nicol, The SSFNet network simulator, 2002.

J. F. Cas and . Cremers, The Scyther tool: Verification, falsification, and analysis of security protocols, Computer Aided Verification (CAV'08), pp.414-418, 2008.

S. Sarjoun, D. P. Doumit, and . Agrawal, Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks, Military Communications Conference (MILCOM'03), pp.609-614, 2003.

[. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.31805-822, 1999.
DOI : 10.1016/S1389-1286(98)00017-6

M. Dong, Y. Li, X. Liu, X. Li, and . Liao, Topological detection on wormholes in wireless ad hoc and sensor networks, IEEE/ACM Transactions on Networking, vol.19, issue.6, pp.1787-1796, 2011.
DOI : 10.1109/TNET.2011.2163730

E. [. Dierks and . Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, issue.5878, p.6176, 2008.
DOI : 10.17487/rfc5246

T. Duong and J. Rizzo, Here come the ? ninjas. Unpublished manuscript, 2011.

T. Duong and J. Rizzo, The CRIME attack, Presentation at Ekoparty Security Conference, 2012.

M. Demirbas and Y. Song, An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.564-570, 2006.
DOI : 10.1109/WOWMOM.2006.27

A. Paula, R. Da-silva, M. H. Martins, P. Bruno, . Rocha et al., Decentralized intrusion detection in wireless sensor networks, ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet'05), pp.16-23, 2005.

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

S. [. Eisenbarth and . Kumar, A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.24, issue.6, pp.522-533, 2007.
DOI : 10.1109/MDT.2007.178

. [. Erdene-ochir, M. Kountouris, F. Minier, and . Valois, A New Metric to Quantify Resiliency in Networking, IEEE Communications Letters, vol.16, issue.10, pp.161699-1702, 2012.
DOI : 10.1109/LCOMM.2012.081612.121191

URL : https://hal.archives-ouvertes.fr/hal-00749146

M. Eomvk10a-]-ochirkhand-erdene-ochir, F. Minier, A. Valois, and . Kountouris, Resiliency of wireless sensor networks: Definitions and analyses, Telecommunications (ICT'10), pp.828-835, 2010.

M. Eomvk10b-]-ochirkhand-erdene-ochir, F. Minier, A. Valois, and . Kountouris, Toward resilient routing in wireless sensor networks: gradient-based routing in focus, International Conference on Sensor Technologies and Applications (SENSORCOMM'10), pp.478-483, 2010.

[. Erdene-ochir, M. Minier, F. Valois, and A. Kountouris, Enhancing resiliency against routing layer attacks in wireless sensor networks: Gradient-based routing in focus, International Journal On Advances in Networks and Services, vol.4, issue.1 2, pp.38-54, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00643873

[. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern, RSA-OAEP is secure under the RSA assumption, Advances in Cryptology (CRYPTO'01), pp.260-274, 2001.
DOI : 10.1007/3-540-44647-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Fall and K. Varadhan, The network simulator (ns-2), 2007.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

S. Gajek, M. Manulis, O. Pereira, A. Sadeghi, and J. Schwenk, Universally Composable Security Analysis of TLS, Provable Security (ProvSec'08), pp.313-327, 2008.
DOI : 10.1007/11555827_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Goldwasser, S. Micali, and R. L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM, vol.38, issue.3, pp.690-728, 1991.
DOI : 10.1145/116825.116852

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic et al., Castor: Scalable Secure Routing for Ad Hoc Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462115

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. [. Gabriel and . Sokal, A New Statistical Approach to Geographic Variation Analysis, Systematic Zoology, vol.18, issue.3, pp.259-278, 1969.
DOI : 10.2307/2412323

R. Gardner-stephen, J. Challans, A. Lakeman, D. Bettison, M. Gardner-stephen et al., The serval mesh: A platform for resilient communications in disaster & crisis, 2013 IEEE Global Humanitarian Technology Conference (GHTC), pp.162-166, 2013.
DOI : 10.1109/GHTC.2013.6713674

C. Robert and . Hansen, Phased array antennas, 2009.

[. Hall, M. Barbeau, and E. Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting, Communications, Internet, and Information Technology, pp.201-206, 2004.

N. Hiran, P. Carlsson, and . Gill, Characterizing largescale routing anomalies: A case study of the China Telecom incident, Passive and Active Measurement, pp.229-238, 2013.

Y. Huang and W. Lee, Attack Analysis and Detection for Ad Hoc Routing Protocols, Recent Advances in Intrusion Detection, pp.125-145, 2004.
DOI : 10.1007/978-3-540-30143-1_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Hu, A. Perrig, and D. B. Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005.
DOI : 10.1145/570645.570648

M. Sundararajan, A. Datta, A. Derek, and J. C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS, Conference on Computer and Communications Security (CCS'05), pp.2-15, 2005.

P. Jamet and . Lafourcade, Discovering Flaws in IDS Through Analysis of Their Inputs, Fundations and Practice of Security (FPS'13), pp.391-407, 2013.
DOI : 10.1007/978-3-319-05302-8_24

R. Jamet and P. Lafourcade, Formal Model for (k)-Neighborhood Discovery Protocols, Advances in Network Analysis and its Applications, p.181
DOI : 10.1007/978-3-642-30904-5_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. David, D. A. Johnson, and . Maltz, Dynamic source routing in ad hoc wireless networks, Mobile computing, pp.153-181, 1996.

B. Karp, Challenges in geographic routing: Sparse networks, obstacles , and traffic provisioning, Presentation at the DIMACS Workshop on Pervasive Networking, 2001.

[. Kargl, A. Geiß, S. Schlott, and M. Weber, Secure Dynamic Source Routing, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005.
DOI : 10.1109/HICSS.2005.531

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

Y. Kim, N. Seok, Y. Choi, T. Choi, and . Kwon, Optimal Multi-sink Positioning and Energy-Efficient Routing in Wireless Sensor?Networks, Information Networking. Convergence in Broadband and Mobile Networking (ICOIN'05), pp.264-274
DOI : 10.1007/978-3-540-30582-8_28

[. Krügel, T. Toth, and E. Kirda, Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002.
DOI : 10.1145/508791.508835

C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Ad hoc networks, pp.293-315, 2003.
DOI : 10.1016/s1570-8705(03)00008-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall et al., Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000.
DOI : 10.1109/DISCEX.2000.821506

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Paul-lippmann and K. W. Ingols, An annotated review of past papers on attack graphs, 2005.

M. Li, I. Koutsopoulos, and R. Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1307-1315, 2007.
DOI : 10.1109/INFCOM.2007.155

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Liu, Y. Li, and H. Man, Short paper, Proceedings of the fourth ACM conference on Wireless network security, WiSec '11, pp.418-420, 2005.
DOI : 10.1145/1998412.1998439

[. Levis, N. Lee, M. Welsh, and D. Culler, TOSSIM, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.126-137, 2003.
DOI : 10.1145/958491.958506

A. Liu and P. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.245-256, 2008.
DOI : 10.1109/IPSN.2008.47

G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133, 1995.
DOI : 10.1016/0020-0190(95)00144-2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997.
DOI : 10.1109/CSFW.1997.596782

A. P. Lauf, R. A. Peters, and W. H. Robinson, A distributed intrusion detection system for resource-constrained devices in ad-hoc networks, Ad Hoc Networks, pp.253-266, 2010.
DOI : 10.1016/j.adhoc.2009.08.002

M. Luby and C. Rackoff, How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, vol.17, issue.2, pp.373-386, 1988.
DOI : 10.1137/0217022

Y. Wei-law, L. Van-hoesel, J. Doumen, P. Hartel, and P. Havinga, Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, Workshop on Security of Ad hoc and Sensor Networks (SASN'05), pp.76-88, 2005.

M. Li, J. Zhao, Y. Walker, A. Hu, W. Perrig et al., SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.325-340, 2009.
DOI : 10.1145/1368310.1368339

J. Marshall, An analysis of SRP for mobile ad hoc networks, International Multiconference in Computer Science (IMECS'02), pp.18-21, 2002.

J. Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000.
DOI : 10.1145/382912.382923

S. Victor and . Miller, Use of elliptic curves in cryptography, Advances in Cryptology, pp.417-426, 1986.

J. M. Mcquillan, I. Richer, and E. Rosen, The New Routing Algorithm for the ARPANET, IEEE Transactions on Communications, vol.28, issue.5, pp.711-719, 1980.
DOI : 10.1109/TCOM.1980.1094721

[. Morrissey, N. P. Smart, and B. Warinschi, A Modular Security Analysis of the TLS Handshake Protocol, Advances in Cryptology (ASIACRYPT'08), pp.55-73, 2008.
DOI : 10.1145/322510.322530

[. Murphy, BGP Security Vulnerabilities Analysis, RFCInformational), vol.4272, 2006.
DOI : 10.17487/rfc4272

N. Meratnia, B. J. Van-der-zwaag, W. Hylke, . Van-dijk, J. Dennis et al., Sensor Networks in the Low Lands, Sensors, vol.14, issue.9, pp.8504-8525, 2010.
DOI : 10.1109/MWC.2007.4407228

S. Nakayama, A. Kurosawa, Y. Jamalipour, N. Nemoto, and . Kato, A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol.58, issue.5, pp.2471-2481, 2009.
DOI : 10.1109/TVT.2008.2010049

[. Onat and A. Miri, An intrusion detection system for wireless sensor networks, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.253-259, 2005.
DOI : 10.1109/WIMOB.2005.1512911

[. Onat and A. Miri, A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), pp.422-427, 2005.
DOI : 10.1109/ICW.2005.16

C. Lawrence and . Paulson, Inductive analysis of the internet protocol TLS, Transactions on Information and System Security (TISSEC'99), pp.332-351, 1999.

J. Polley, D. Blazakis, J. Mcgee, D. Rusk, and J. S. Baras, ATEMU: a fine-grained sensor network simulator, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004., pp.145-152, 2004.
DOI : 10.1109/SAHCN.2004.1381912

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Papadimitratos and Z. J. Haas, Secure routing for mobile ad hoc networks, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS'02), pp.193-204, 2002.

[. Jr, H. Thiago, . De-paula-figueiredo, C. Hao, A. A. Wong et al., Malicious node detection in wireless sensor networks, International Parallel and Distributed Processing Symposium (IPDPS'04), p.24, 2004.

]. D. Plu82 and . Plummer, Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware, INTERNET STANDARD), p.5494, 1982.

J. Parker, A. Patwardhan, and A. Joshi, Cross-layer analysis for detecting wireless misbehavior, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., pp.6-9, 2006.
DOI : 10.1109/CCNC.2006.1592977

E. Charles, E. M. Perkins, and . Royer, Ad-hoc on-demand distance vector routing, Mobile Computing Systems and Applications (WMCSA'99), pp.90-100, 1999.

C. Phillips and L. P. Swiler, A graph-based system for network-vulnerability analysis, Proceedings of the 1998 workshop on New security paradigms , NSPW '98, pp.71-79, 1998.
DOI : 10.1145/310889.310919

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Sobeih, J. C. Hou, L. Kung, N. Li, H. Zhang et al., J-Sim: A Simulation and emulation environment for wireless sensor networks, IEEE Wireless Communications, vol.13, issue.4, pp.104-119, 2006.
DOI : 10.1109/MWC.2006.1678171

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Sundresh, W. Kim, and G. Agha, SENS: a sensor, environment and network simulator, 37th Annual Simulation Symposium, 2004. Proceedings., p.221, 2004.
DOI : 10.1109/SIMSYM.2004.1299486

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Schurgers and M. B. Srivastava, Energy efficient routing in wireless sensor networks, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.357-361, 2001.
DOI : 10.1109/MILCOM.2001.985819

H. Song, L. Xie, S. Zhu, and G. Cao, Sensor node compromise detection, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, pp.242-247, 2007.
DOI : 10.1145/1280940.1280993

P. Tseng, C. Balasubramanyam, R. Ko, J. Limprasittiporn, K. Rowe et al., A specification-based intrusion detection system for AODV, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.125-134, 2003.
DOI : 10.1145/986858.986876

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Thamilarasu, A. Balasubramanian, S. Mishra, and R. Sridhar, A cross-layer based intrusion detection approach for wireless ad hoc networks, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., p.7, 2005.
DOI : 10.1109/MAHSS.2005.1542882

]. P. Thu12 and . Thubert, Objective Function Zero for the Routing Protocol for Low- Power and Lossy Networks (RPL), RFC, vol.6552, 2012.

T. Tseng, P. Song, C. Balasubramanyam, K. Ko, and . Levitt, A Specification-Based Intrusion Detection Model for OLSR, Recent Advances in Intrusion Detection (RAID'06), pp.330-350, 2006.
DOI : 10.1007/11663812_17

[. Tseng, S. Wang, C. Ko, and K. Levitt, DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET, Recent Advances in Intrusion Detection (RAID'06), pp.249-271, 2006.
DOI : 10.1007/11856214_13

J. Von-mulert, I. Welch, and W. K. Seah, Security threats and solutions in MANETs: A case study using AODV and SAODV, Journal of Network and Computer Applications, vol.35, issue.4, pp.1249-1259, 2012.
DOI : 10.1016/j.jnca.2012.01.019

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, pp.103-135, 2007.
DOI : 10.1007/978-0-387-33112-6_5

L. [. Wood, J. A. Fang, T. Stankovic, and . He, SIGF, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.35-48, 2006.
DOI : 10.1145/1180345.1180351

L. Wang, A. Liu, and S. Jajodia, Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts, Computer Communications, vol.29, issue.15, pp.2917-2933, 2006.
DOI : 10.1016/j.comcom.2006.04.001

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Wagner and P. Soto, Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.255-264, 2002.
DOI : 10.1145/586110.586145

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Yang, X. Wang, S. Zhu, and G. Cao, Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.219-230, 2007.
DOI : 10.1109/SRDS.2007.31

[. Zapata, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002.
DOI : 10.1145/581291.581312

. Proba-prpproba, * advprp(enc) *) expand PRP_cipher(keyseed, key, block, kgen, enc, dec, PRPProba)