WSN research activities for military application, Proceedings of the 11th International Conference on Advanced Communication Technology, pp.15-18, 2009. ,
Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999. ,
DOI : 10.1016/S1389-1286(98)00017-6
Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, vol.14, issue.5, pp.56-63, 2007. ,
DOI : 10.1109/MWC.2007.4396943
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, pp.120-126, 1978. ,
DOI : 10.1145/357980.358017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. Inf. Theory, vol.31, pp.469-472, 1985. ,
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.24, issue.6, pp.522-533, 2007. ,
DOI : 10.1109/MDT.2007.178
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp.29-31, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00918974
Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol.8, issue.2, pp.10-1186, 2013. ,
DOI : 10.1016/j.ins.2008.05.031
URL : https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-1499-2013-151?site=jwcn-eurasipjournals.springeropen.com
Code Polymorphism to Secure Devices, Proceedings of the 11th International Conference on Security and Cryptography, pp.28-30, 2014. ,
Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications, vol.33, issue.2, pp.63-75, 2010. ,
DOI : 10.1016/j.jnca.2009.10.001
Security architecture for multi-hop wireless sensor networks, Security for Multihop Wireless Networks, pp.157-178, 2014. ,
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proceedings of the 20th International Conference on Computer Aided Verification, pp.7-14, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Secure key renewal and revocation for Wireless Sensor Networks, 39th Annual IEEE Conference on Local Computer Networks, pp.8-11, 2014. ,
DOI : 10.1109/LCN.2014.6925797
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks, Journal of Sensor and Actuator Networks, vol.5458, issue.3, pp.224-244 ,
DOI : 10.1007/s11277-013-1419-y
URL : https://hal.archives-ouvertes.fr/hal-01593137
Secure Multihop Key Establishment Protocols for Wireless Sensor Networks, Proceedings of International Conference on Cryptography and Security Systems, pp.22-24, 2014. ,
DOI : 10.1007/978-3-662-44893-9_15
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005., pp.7-9, 2005. ,
DOI : 10.1109/PCCC.2005.1460551
State-based key management scheme for wireless sensor networks, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2005. ,
Random key assignment for secure wireless sensor networks, Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks, pp.27-30, 2003. ,
Agrawal, D. Enhanced Approach for Random Key Pre-Distribution in Wireless Sensor Networks, Proceedings of International Conference on Communication, Networking and Information Technology, pp.6-8, 2007. ,
An Improved Key Distribution Mechanism for Large-Scale Hierarchical Wireless Networks Key Distribution. AD HOC Netw, J, vol.5, pp.35-48, 2007. ,
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.3, pp.233-247, 2005. ,
DOI : 10.1109/TDSC.2005.37
Random key predistribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, pp.11-14, 2003. ,
A Scheme for Key Revocation in Wireless Sensor Networks, Int. J. Adv. Comput. Eng. Commun. Technol, vol.1, pp.16-20, 2012. ,
A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks, J. Electron. Sci. Technol. China, vol.6, pp.10-15, 2008. ,
An Efficient Key Revocation Protocol for Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.26-29, 2006. ,
DOI : 10.1109/WOWMOM.2006.23
A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks, J. Inf. Sci. Eng, vol.26, pp.1859-1873, 2010. ,
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, 2007 IEEE International Conference on Communications, pp.24-28, 2007. ,
DOI : 10.1109/ICC.2007.213
Revocation and Self-Healing of keys in Hierarchical Wireless Sensor Network, Int. J. Comput. Sci. Inf. Technol, vol.2, pp.2909-2914, 2011. ,
A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks, Proceedings of the 9th Joint Conference on Information Sciences (JCIS), pp.8-11, 2006. ,
DOI : 10.2991/jcis.2006.314
Lightweight Key Renewals for Clustered Sensor Networks, J. Netw, vol.5, pp.300-312, 2010. ,
DOI : 10.4304/jnw.5.3.300-312
URL : http://ojs.academypublisher.com/index.php/jnw/article/viewFile/0503300312/1693/
A low-energy key management protocol for wireless sensor networks, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003. ,
DOI : 10.1109/ISCC.2003.1214142
SEC 1: Elliptic Curve Cryptography Available online: http://www.secg, 2000. ,
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.22-24, 2008. ,
DOI : 10.1109/IPSN.2008.47
A Proposal for an ISO Standard for Public Key Encryption. IACR Cryptology ePrint Archive Available online: http://eprint.iacr.org, 2001. ,
The Design of Rijndael: AES?The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
WSN?Secure comunications with AES algoritms, 2008. ,
Elliptic Curves in Cryptography, 1999. ,
DOI : 10.1017/CBO9781107360211
Use of Elliptic Curves in Cryptography, pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, pp.279-298, 2007. ,
DOI : 10.1007/978-0-387-46276-9_12
URL : http://www.ee.washington.edu/research/nsl/papers/book-2006-ch-2.pdf
Modeling and verifying ad hoc routing protocols, Information and Computation, vol.238, pp.30-67, 2010. ,
DOI : 10.1016/j.ic.2014.07.004
URL : https://hal.archives-ouvertes.fr/hal-00881009
Formal Verification of Secure Ad Hoc Routing Protocols Using AVISPA: ARAN Case Study, Proceedings of the 4th Conference on European Computing Conference, pp.20-22, 2010. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of 17th International Conference, CAV 2005, pp.6-10, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004. ,
DOI : 10.1109/SECPRI.2004.1301317
Comparing State Spaces in Automatic Security Protocol Analysis. In Formal to Practical Security, pp.70-94, 2009. ,
DOI : 10.1007/978-3-642-02002-5_5
Scyther code of our authentication protocols Available online: http://sancy.univ-bpclermont.fr/~lafourcade/scyther-jsan-code.tar (accessed on 26, 2015. ,
Evaluation of different cryptographic algorithms on wireless sensor network nodes, 2012 International Conference on Wireless Communications in Underground and Confined Areas, pp.28-30, 2012. ,
DOI : 10.1109/ICWCUCA.2012.6402500
URL : https://hal.archives-ouvertes.fr/hal-01593156
Available online: https://www.iot-lab.info, 2015. ,