M. J. Khabbaz, C. M. Assi, and W. F. Fawaz, Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.607-640, 2012.
DOI : 10.1109/SURV.2011.041911.00093

P. R. Pereira, A. Casaca, J. J. Rodrigues, V. N. Soares, J. Triay et al., From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks, IEEE Communications Surveys & Tutorials, vol.14, issue.4, pp.1166-1182, 2012.
DOI : 10.1109/SURV.2011.081611.00102

P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.1576-1589, 2011.
DOI : 10.1145/1374618.1374652

V. N. Soares, J. J. Rodrigues, and F. Farahmand, GeoSpray: A geographic routing protocol for vehicular delay-tolerant networks, Information Fusion, vol.15, pp.102-113, 2014.
DOI : 10.1016/j.inffus.2011.11.003

H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.22-32, 2014.
DOI : 10.1109/TPDS.2013.36

L. Galluccio, B. Lorenzo, and S. Glisic, Sociality-Aided New Adaptive Infection Recovery Schemes for Multicast DTNs, IEEE Transactions on Vehicular Technology, vol.65, issue.5, pp.1-1, 2015.
DOI : 10.1109/TVT.2015.2450202

M. Panda, A. Ali, T. Chahed, and E. Altman, Tracking Message Spread in Mobile Delay Tolerant Networks, IEEE Transactions on Mobile Computing, vol.14, issue.8, pp.1737-1750, 2015.
DOI : 10.1109/TMC.2014.2362746

URL : https://hal.archives-ouvertes.fr/hal-01205134

W. Li, F. Bassi, D. Dardari, M. Kieffer, and G. Pasolini, Defective Sensor Identification for WSNs Involving Generic Local Outlier Detection Tests, IEEE Transactions on Signal and Information Processing over Networks, vol.2, issue.1, pp.29-48, 2016.
DOI : 10.1109/TSIPN.2016.2516821

URL : https://hal.archives-ouvertes.fr/hal-01260533

Y. Zhang, N. Meratnia, and P. Havinga, Outlier Detection Techniques for Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.12, issue.2, pp.159-170, 2010.
DOI : 10.1109/SURV.2010.021510.00088

A. Mahapatro and P. M. Khilar, Fault Diagnosis in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2000-2026, 2013.
DOI : 10.1109/SURV.2013.030713.00062

H. Dong, Z. Wang, S. X. Ding, and H. Gao, A Survey on Distributed Filtering and Fault Detection for Sensor Networks, Mathematical Problems in Engineering, vol.2014, 2014.
DOI : 10.1080/21642583.2013.804463

J. Chen, S. Kher, and A. Somani, Distributed fault detection of wireless sensor networks, Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks , DIWANS '06, pp.65-72, 2006.
DOI : 10.1145/1160972.1160985

J. Gao, Y. Xu, and X. Li, Weighted-Median Based Distributed Fault Detection for Wireless Sensor Networks, Journal of Software, vol.18, issue.5, pp.1208-1217, 2007.
DOI : 10.1360/jos181208

S. Ji, S. Yuan, T. Ma, and C. Tan, Distributed Fault Detection for Wireless Sensor Based on Weighted Average, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp.57-60, 2010.
DOI : 10.1109/NSWCTC.2010.21

M. Panda and P. Khilar, Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test, Ad Hoc Networks, pp.170-184, 2015.
DOI : 10.1016/j.adhoc.2014.10.006

B. Zhu, W. Zhang, W. Feng, and L. Zhang, Distributed faulty node detection and isolation in delay-tolerant vehicular sensor networks, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC), pp.1497-1502, 2012.
DOI : 10.1109/PIMRC.2012.6362584

W. Peng, F. Li, X. Zou, and J. Wu, Behavioral Malware Detection in Delay Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.53-63, 2014.
DOI : 10.1109/TPDS.2013.27

E. Hernandez-orallo, M. D. Serrat-olmos, J. Cano, C. T. Calafate, and P. Manzoni, CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transactions on Mobile Computing, vol.14, issue.6, pp.1162-1175, 2015.
DOI : 10.1109/TMC.2014.2343627

E. Ayday and F. Fekri, An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks, IEEE Transactions on Mobile Computing, vol.11, issue.9, pp.1514-1531, 2012.
DOI : 10.1109/TMC.2011.160

Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao, and D. S. Wallach, The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transactions on Mobile Computing, vol.14, issue.11, pp.2376-2391, 2015.
DOI : 10.1109/TMC.2015.2398425

J. R. Douceur, The sybil attack, " in Peer-to-peer Systems, pp.251-260, 2002.

G. Han, J. Jiang, L. Shu, and M. Guizani, An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network, IEEE Transactions on Mobile Computing, vol.14, issue.12, pp.2447-2459, 2015.
DOI : 10.1109/TMC.2015.2402120

H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li et al., Recognizing Exponential Inter-Contact Time in VANETs, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010.
DOI : 10.1109/INFCOM.2010.5462263

J. P. Norton, Special Issue on Bounded-Error Estimation: Issue 1, Int. Jnl of Adapt. Cont. and Sig. Proc, vol.8, issue.1, pp.1-118, 1994.

M. Milanese, J. Norton, H. Piet-lahanier, and E. Walter, Bounding Approaches to System Identification, 1996.
DOI : 10.1007/978-1-4757-9545-5

L. Jaulin, M. Kieffer, O. Didrit, and E. Walter, Applied Interval Analysis, 2001.
DOI : 10.1007/978-1-4471-0249-6

URL : https://hal.archives-ouvertes.fr/hal-00845131

A. Granas and J. Dugundji, Fixed point theory, 2013.
DOI : 10.1007/978-0-387-21593-8

S. Banach, Sur les opérations dans les ensembles abstraits et leur application auxéquationsaux´auxéquations intégrales, Fund. Math, vol.3, issue.1, pp.133-181, 1922.

N. Eagle and A. Pentland, Reality mining: sensing complex social systems, Personal and ubiquitous computing, pp.255-268, 2006.
DOI : 10.1007/s00779-005-0046-3

M. Orlinski, Encounter traces for the one simulator

T. M. Cover and J. A. Thomas, Elements of information theory, 2012.