Security Vulnerabilities in Wireless Sensor Networks: A Survey, J. Inf. Assur. Secur, vol.5, pp.31-34, 2010. ,
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Soft. Concepts Tools, pp.93-102, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : http://www.cs.ubc.ca/~ajh/courses/cpsc513/NSFDR.ps
Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.9-12, 2004. ,
DOI : 10.1109/SECPRI.2004.1301317
AVISPA: Visualizing the performance prediction of parallel iterative solvers, Future Gener. Comput. Syst, vol.19, pp.721-733, 2003. ,
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proceedings of the 2008 20th International Conference Computer Aided Verification, pp.7-14, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Model Checking Security Protocols, Handbook of Model Checking, 2014. ,
Adaptive Approach to Network Security, Computer Networks, pp.233-241, 2009. ,
DOI : 10.1016/j.cose.2004.11.002
Scyther code of our authentication protocols Available online, 2014. ,
Multihop Node Authentication Mechanisms for Wireless Sensor Networks, Proceedings of the 13th International Conference (ADHOC-NOW 2014), pp.22-27 ,
DOI : 10.1007/978-3-319-07425-2_30
URL : https://hal.archives-ouvertes.fr/hal-01593137
Security architecture for multi-hop wireless sensor networks, Security for Multihop Wireless Networks, pp.157-178, 2014. ,
Secure Sensor Node Authentication in Wireless Sensor Networks, Int. J. Comput. Appl, vol.46, pp.10-17, 2012. ,
Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, vol.8, issue.3, pp.1086-1090, 2009. ,
DOI : 10.1109/TWC.2008.080128
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography, Sensors, vol.48, issue.12, pp.4767-4779, 2011. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Sensor Authentication in Dynamic Wireless Sensor Network Environments, International Journal of RFID Security and Cryptography, vol.1, issue.2, pp.36-44, 2012. ,
DOI : 10.20533/ijrfidsc.2046.3715.2012.0005
A Robust Message Authentication Scheme in Multihop WSN Using Elliptical Curve Cryptography and Elgamal Signature, Int. J. Eng. Res. Technol. (IJERT), issue.2, 2013. ,
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks, Proceedings of the 7th International ICST Conference, pp.6-9, 2010. ,
DOI : 10.1145/1029102.1029113
Classification of Symmetric Key Management Schemes for Wireless Sensor Networks, Int. J. Secur. Its Appl, 2013. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002. ,
DOI : 10.1145/381677.381696
Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.14-17, 2000. ,
DOI : 10.1109/SECPRI.2000.848446
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC), pp.2-4, 2010. ,
DOI : 10.1109/ICWCSC.2010.5415904
PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp.13-17, 2005. ,
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.22-26, 2009. ,
DOI : 10.1109/SAHCN.2009.5168906
An Optimal Class of Symmetric Key Generation Systems, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp.9-11, 1984. ,
DOI : 10.1007/3-540-39757-4_22
A random perturbation-based scheme for pairwise key establishment in sensor networks, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.9-14, 2007. ,
DOI : 10.1145/1288107.1288120
Smart dust: Wireless networks of millimeter-scale sensor nodes, Available, vol.online ,
Secure dynamic source routing protocol, Proceedings of the 2004 Fourth International Conference on Computer and Information Technology, pp.14-16, 2004. ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proceedings of the 17th International Conference (CAV'2005), pp.6-10, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Comparing State Spaces in Automatic Security Protocol Analysis, Formal to Practical Security, pp.70-94, 2009. ,
DOI : 10.1007/11805618_21
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint, Proceedings of the 14th International Workshop, pp.9-12, 2012. ,
DOI : 10.1007/978-3-642-33027-8_23
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, Proceedings of the 5th International Conference on Cryptology in Africa, pp.10-12172, 2012. ,
DOI : 10.1007/978-3-642-31410-0_11
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, Proceedings of the 11th International Conference, pp.28-30, 2012. ,
DOI : 10.1007/978-3-642-37288-9_11
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp.29-31, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00918974
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.22-24, 2008. ,
DOI : 10.1109/IPSN.2008.47
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
The Design of Rijndael: AES?The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol, Wirel. Personal Commun, vol.75, pp.2014-1747 ,