T. Kavitha and D. Sridharan, Security Vulnerabilities in Wireless Sensor Networks: A Survey, J. Inf. Assur. Secur, vol.5, pp.31-34, 2010.

G. Lowe, Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Soft. Concepts Tools, pp.93-102, 1996.
DOI : 10.1007/3-540-61042-1_43

URL : http://www.cs.ubc.ca/~ajh/courses/cpsc513/NSFDR.ps

B. Blanchet, Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004.
DOI : 10.1109/SECPRI.2004.1301317

V. B. Pérez, P. González, J. C. Cabaleiro, D. B. Heras, T. F. Pena et al., AVISPA: Visualizing the performance prediction of parallel iterative solvers, Future Gener. Comput. Syst, vol.19, pp.721-733, 2003.

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proceedings of the 2008 20th International Conference Computer Aided Verification, pp.7-14, 2008.
DOI : 10.1007/978-3-540-70545-1_38

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

D. Basin, C. Cremers, and C. Meadows, Model Checking Security Protocols, Handbook of Model Checking, 2014.

B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, Adaptive Approach to Network Security, Computer Networks, pp.233-241, 2009.
DOI : 10.1016/j.cose.2004.11.002

I. Mansour, P. Lafourcade, and G. Chalhoub, Scyther code of our authentication protocols Available online, 2014.

I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, and B. Ksiezopolski, Multihop Node Authentication Mechanisms for Wireless Sensor Networks, Proceedings of the 13th International Conference (ADHOC-NOW 2014), pp.22-27
DOI : 10.1007/978-3-319-07425-2_30

URL : https://hal.archives-ouvertes.fr/hal-01593137

I. Mansour, G. Chalhoub, and M. Misson, Security architecture for multi-hop wireless sensor networks, Security for Multihop Wireless Networks, pp.157-178, 2014.

A. Al-mahmud and R. Akhtar, Secure Sensor Node Authentication in Wireless Sensor Networks, Int. J. Comput. Appl, vol.46, pp.10-17, 2012.

M. L. Das, Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, vol.8, issue.3, pp.1086-1090, 2009.
DOI : 10.1109/TWC.2008.080128

H. L. Yeh, T. H. Chen, P. C. Liu, T. H. Kim, and H. W. Wei, A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography, Sensors, vol.48, issue.12, pp.4767-4779, 2011.
DOI : 10.1090/S0025-5718-1987-0866109-5

K. Han and T. Shon, Sensor Authentication in Dynamic Wireless Sensor Network Environments, International Journal of RFID Security and Cryptography, vol.1, issue.2, pp.36-44, 2012.
DOI : 10.20533/ijrfidsc.2046.3715.2012.0005

L. B. Manjusha-;-rananavare, A Robust Message Authentication Scheme in Multihop WSN Using Elliptical Curve Cryptography and Elgamal Signature, Int. J. Eng. Res. Technol. (IJERT), issue.2, 2013.

J. Zhang, R. Shankaran, M. A. Orgun, A. Sattar, and V. Varadharajan, A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks, Proceedings of the 7th International ICST Conference, pp.6-9, 2010.
DOI : 10.1145/1029102.1029113

S. Bala, G. Sharma, and A. Verma, Classification of Symmetric Key Management Schemes for Wireless Sensor Networks, Int. J. Secur. Its Appl, 2013.

A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

A. Perrig, R. Canetti, J. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.14-17, 2000.
DOI : 10.1109/SECPRI.2000.848446

E. Munivel and G. Ajit, Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC), pp.2-4, 2010.
DOI : 10.1109/ICWCSC.2010.5415904

H. Chan and A. Perrig, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp.13-17, 2005.

C. Yu, C. Lu, and S. Kuo, A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.22-26, 2009.
DOI : 10.1109/SAHCN.2009.5168906

R. Blom, An Optimal Class of Symmetric Key Generation Systems, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp.9-11, 1984.
DOI : 10.1007/3-540-39757-4_22

W. Zhang, M. Tran, S. Zhu, and G. Cao, A random perturbation-based scheme for pairwise key establishment in sensor networks, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.9-14, 2007.
DOI : 10.1145/1288107.1288120

K. S. Pister, J. M. Kahn, and B. E. Boser, Smart dust: Wireless networks of millimeter-scale sensor nodes, Available, vol.online

T. Jiang, Q. Li, and Y. Ruan, Secure dynamic source routing protocol, Proceedings of the 2004 Fourth International Conference on Computer and Information Technology, pp.14-16, 2004.

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of the 17th International Conference (CAV'2005), pp.6-10, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

C. J. Cremers, P. Lafourcade, and P. Nadeau, Comparing State Spaces in Automatic Security Protocol Analysis, Formal to Practical Security, pp.70-94, 2009.
DOI : 10.1007/11805618_21

S. Kerckhof, F. Durvaux, C. Hocquet, D. Bol, and F. Standaert, Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint, Proceedings of the 14th International Workshop, pp.9-12, 2012.
DOI : 10.1007/978-3-642-33027-8_23

T. Eisenbarth, Z. Gong, T. Guneysu, S. Heyse, S. Indesteege et al., Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, Proceedings of the 5th International Conference on Cryptology in Africa, pp.10-12172, 2012.
DOI : 10.1007/978-3-642-31410-0_11

J. Balasch, B. Ege, T. Eisenbarth, B. Gerard, Z. Gong et al., Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, Proceedings of the 11th International Conference, pp.28-30, 2012.
DOI : 10.1007/978-3-642-37288-9_11

M. Cazorla, K. Marquet, and M. Minier, Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp.29-31, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00918974

A. Liu and N. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.22-24, 2008.
DOI : 10.1109/IPSN.2008.47

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

J. Daemen and V. Rijmen, The Design of Rijndael: AES?The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

N. Moati, H. Otrok, A. Mourad, and J. M. Robert, Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol, Wirel. Personal Commun, vol.75, pp.2014-1747