M. A. Hussain, P. Khan, and K. K. Sup, WSN research activities for military application, Proceedings of the 11th International Conference on Advanced Communication Technology, pp.15-18, 2009.

H. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999.
DOI : 10.1016/S1389-1286(98)00017-6

B. Sun, L. Osborne, Y. Xiao, and S. Guizani, Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, vol.14, issue.5, pp.56-63, 2007.
DOI : 10.1109/MWC.2007.4396943

R. L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, pp.120-126, 1978.
DOI : 10.1145/357980.358017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

E. Gamal and T. , A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. Inf. Theory, vol.31, pp.469-472, 1985.

T. Eisenbarth, S. Kumar, L. Uhsadel, C. Paar, and A. Poschmann, A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.24, issue.6, pp.522-533, 2007.
DOI : 10.1109/MDT.2007.178

M. Cazorla, K. Marquet, and M. Minier, Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp.29-31, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00918974

K. Jeong, C. Lee, and J. Lim, Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol.8, issue.2, pp.10-1186, 2013.
DOI : 10.1016/j.ins.2008.05.031

URL : https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-1499-2013-151?site=jwcn-eurasipjournals.springeropen.com

D. Couroussé, B. Robisson, J. Lanet, T. Barry, H. Noura et al., Code Polymorphism to Secure Devices, Proceedings of the 11th International Conference on Security and Cryptography, pp.28-30, 2014.

J. Zhang and V. Varadharajan, Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications, vol.33, issue.2, pp.63-75, 2010.
DOI : 10.1016/j.jnca.2009.10.001

I. Mansour, G. Chalhoub, and M. Misson, Security architecture for multi-hop wireless sensor networks, Security for Multihop Wireless Networks, pp.157-178, 2014.

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proceedings of the 20th International Conference on Computer Aided Verification, pp.7-14, 2008.
DOI : 10.1007/978-3-540-70545-1_38

I. Mansour, G. Chalhoub, P. Lafourcade, and F. Delobel, Secure key renewal and revocation for Wireless Sensor Networks, 39th Annual IEEE Conference on Local Computer Networks, pp.8-11, 2014.
DOI : 10.1109/LCN.2014.6925797

I. Mansour, G. Chalhoub, and P. Lafourcade, Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks, Journal of Sensor and Actuator Networks, vol.5458, issue.3, pp.224-244
DOI : 10.1007/s11277-013-1419-y

URL : https://hal.archives-ouvertes.fr/hal-01593137

I. Mansour, G. Chalhoub, and P. Lafourcade, Secure Multihop Key Establishment Protocols for Wireless Sensor Networks, Proceedings of International Conference on Cryptography and Security Systems, pp.22-24, 2014.
DOI : 10.1007/978-3-662-44893-9_15

M. Mehta, D. Huang, L. Harn, and . Rink-rkp, RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005., pp.7-9, 2005.
DOI : 10.1109/PCCC.2005.1460551

J. Park, Z. Kim, and K. Kim, State-based key management scheme for wireless sensor networks, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2005.

J. Park, Z. Kim, and K. Kim, Random key assignment for secure wireless sensor networks, Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks, pp.27-30, 2003.

Y. Cheng, M. Malik, and B. Xie, Agrawal, D. Enhanced Approach for Random Key Pre-Distribution in Wireless Sensor Networks, Proceedings of International Conference on Communication, Networking and Information Technology, pp.6-8, 2007.

Y. Cheng and D. Agrawal, An Improved Key Distribution Mechanism for Large-Scale Hierarchical Wireless Networks Key Distribution. AD HOC Netw, J, vol.5, pp.35-48, 2007.

H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, On the Distribution and Revocation of Cryptographic Keys in Sensor Networks, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.3, pp.233-247, 2005.
DOI : 10.1109/TDSC.2005.37

H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, pp.11-14, 2003.

S. Chattopadhyay and A. K. Turuk, A Scheme for Key Revocation in Wireless Sensor Networks, Int. J. Adv. Comput. Eng. Commun. Technol, vol.1, pp.16-20, 2012.

Y. Jiang and H. Shi, A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks, J. Electron. Sci. Technol. China, vol.6, pp.10-15, 2008.

G. Dini and I. Savino, An Efficient Key Revocation Protocol for Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.26-29, 2006.
DOI : 10.1109/WOWMOM.2006.23

P. Chuang, S. Chang, and C. Lin, A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks, J. Inf. Sci. Eng, vol.26, pp.1859-1873, 2010.

Y. Wang, B. Ramamurthy, and X. Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, 2007 IEEE International Conference on Communications, pp.24-28, 2007.
DOI : 10.1109/ICC.2007.213

G. N. Purohit and A. S. Rawat, Revocation and Self-Healing of keys in Hierarchical Wireless Sensor Network, Int. J. Comput. Sci. Inf. Technol, vol.2, pp.2909-2914, 2011.

C. Wang, T. Hong, G. Horng, and W. Wang, A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks, Proceedings of the 9th Joint Conference on Information Sciences (JCIS), pp.8-11, 2006.
DOI : 10.2991/jcis.2006.314

G. Wang, S. Kim, D. Kang, D. Choi, and G. Cho, Lightweight Key Renewals for Clustered Sensor Networks, J. Netw, vol.5, pp.300-312, 2010.
DOI : 10.4304/jnw.5.3.300-312

URL : http://ojs.academypublisher.com/index.php/jnw/article/viewFile/0503300312/1693/

G. Jolly, M. Kusçu, P. Kokate, and M. Younis, A low-energy key management protocol for wireless sensor networks, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003.
DOI : 10.1109/ISCC.2003.1214142

. Standards-for-efficient-cryptography and . Group, SEC 1: Elliptic Curve Cryptography Available online: http://www.secg, 2000.

A. Liu and N. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.22-24, 2008.
DOI : 10.1109/IPSN.2008.47

V. Shoup, A Proposal for an ISO Standard for Public Key Encryption. IACR Cryptology ePrint Archive Available online: http://eprint.iacr.org, 2001.

J. Daemen and V. Rijmen, The Design of Rijndael: AES?The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

N. Manica, M. Saloni, and P. Toldo, WSN?Secure comunications with AES algoritms, 2008.

I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic Curves in Cryptography, 1999.
DOI : 10.1017/CBO9781107360211

V. S. Miller, Use of Elliptic Curves in Cryptography, pp.417-426, 1986.
DOI : 10.1007/3-540-39799-X_31

C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, P. Syverson et al., Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, pp.279-298, 2007.
DOI : 10.1007/978-0-387-46276-9_12

URL : http://www.ee.washington.edu/research/nsl/papers/book-2006-ch-2.pdf

M. Arnaud, V. Cortier, and S. Delaune, Modeling and verifying ad hoc routing protocols, Information and Computation, vol.238, pp.30-67, 2010.
DOI : 10.1016/j.ic.2014.07.004

URL : https://hal.archives-ouvertes.fr/hal-00881009

M. L. Pura, V. V. Patriciu, and I. Bica, Formal Verification of Secure Ad Hoc Routing Protocols Using AVISPA: ARAN Case Study, Proceedings of the 4th Conference on European Computing Conference, pp.20-22, 2010.

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of 17th International Conference, CAV 2005, pp.6-10, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

B. Blanchet, Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004.
DOI : 10.1109/SECPRI.2004.1301317

C. J. Cremers, P. Lafourcade, and P. Nadeau, Comparing State Spaces in Automatic Security Protocol Analysis. In Formal to Practical Security, pp.70-94, 2009.
DOI : 10.1007/978-3-642-02002-5_5

I. Mansour, P. Lafourcade, and G. Chalhoub, Scyther code of our authentication protocols Available online: http://sancy.univ-bpclermont.fr/~lafourcade/scyther-jsan-code.tar (accessed on 26, 2015.

I. Mansour and G. Chalhoub, Evaluation of different cryptographic algorithms on wireless sensor network nodes, 2012 International Conference on Wireless Communications in Underground and Confined Areas, pp.28-30, 2012.
DOI : 10.1109/ICWCUCA.2012.6402500

URL : https://hal.archives-ouvertes.fr/hal-01593156

. Iot-lab, Available online: https://www.iot-lab.info, 2015.