M. Adeyeye and P. Gardner-stephen, The Village Telco project: a reliable and practical wireless mesh telephony infrastructure, EURASIP Journal on Wireless Communications and Networking, vol.31, issue.0146-4833, pp.1-11, 2011.
DOI : 10.1145/505666.505669

F. Anjum and R. Talpade, LiPaD: lightweight packet drop detection for ad hoc networks, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.1233-1237, 2004.
DOI : 10.1109/VETECF.2004.1400219

D. Basin, C. Cremers, and C. Meadows, Model checking security protocols Handbook of Model Checking, 2011.

V. Bhuse and A. Gupta, Anomaly intrusion detection in wireless sensor networks, Journal of High Speed Networks, vol.15, issue.1, pp.33-51, 2006.

K. Bonne-rasmussen and S. Capkun, Implications of radio fingerprinting on the security of sensor networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.331-340, 2007.
DOI : 10.1109/SECCOM.2007.4550352

T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC, vol.3626, 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

M. Conti, R. Di-pietro, L. V. Mancini, and A. Mei, A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.80-89, 2007.
DOI : 10.1145/1288107.1288119

J. Cucurull, M. Asplund, and S. Nadjm-tehrani, Anomaly Detection and Mitigation for Disaster Area Networks, Recent Advances in Intrusion Detection, pp.339-359, 2010.
DOI : 10.1007/978-3-642-15512-3_18

URL : http://www.ida.liu.se/%7Ertslab/publications/2010/CucurullEtAl_RAID2010.pdf

A. P. Da-silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz et al., Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks , Q2SWinet '05, pp.16-23, 2005.
DOI : 10.1145/1089761.1089765

H. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.31805-822, 1999.
DOI : 10.1016/S1389-1286(98)00017-6

M. Demirbas and Y. Song, An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.564-570, 2006.
DOI : 10.1109/WOWMOM.2006.27

D. Dong, M. Li, Y. Liu, X. Li, and X. Liao, Topological detection on wormholes in wireless ad hoc and sensor networks, IEEE/ACM Transactions on Networking, vol.19, issue.6, pp.1787-1796, 2011.
DOI : 10.1109/TNET.2011.2163730

S. S. Doumit and D. P. , Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor networks, IEEE Military Communications Conference, 2003. MILCOM 2003., pp.609-614, 2003.
DOI : 10.1109/MILCOM.2003.1290173

P. Gardner-stephen and S. Palaniswamy, Serval mesh software-WiFi multi model management, Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, ACWR '11, pp.71-77, 2011.
DOI : 10.1145/2185216.2185245

J. Hall, M. Barbeau, and E. Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting, Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT), pp.201-206, 2004.

W. Huang and . Lee, Attack Analysis and Detection for Ad Hoc Routing Protocols, Recent Advances in Intrusion Detection, pp.125-145, 2004.
DOI : 10.1007/978-3-540-30143-1_7

URL : http://www.itsec.gov.cn/docs/20090507142359035138.pdf

C. Krügel, T. Toth, and E. Kirda, Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002.
DOI : 10.1145/508791.508835

Y. Liu, Y. Li, and H. Man, Short paper, Proceedings of the fourth ACM conference on Wireless network security, WiSec '11, pp.418-420, 2005.
DOI : 10.1145/1998412.1998439

H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, A dynamic anomaly detection scheme for aodv-based mobile ad hoc networks. Vehicular Technology, IEEE Transactions on, vol.58, issue.5, pp.2471-2481, 2009.

I. Onat and A. Miri, An intrusion detection system for wireless sensor networks, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.253-259, 2005.
DOI : 10.1109/WIMOB.2005.1512911

I. Onat and A. Miri, A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), pp.422-427, 2005.
DOI : 10.1109/ICW.2005.16

J. Parker, A. Patwardhan, and A. Joshi, Cross-layer analysis for detecting wireless misbehavior, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., pp.6-9, 2006.
DOI : 10.1109/CCNC.2006.1592977

C. Perkins, E. Belding-royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC, vol.3561, 2003.
DOI : 10.17487/rfc3561

W. R. Pires-jr, T. H. De-paula-figueiredo, H. C. Wong, and A. A. Loureiro, Malicious node detection in wireless sensor networks, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., p.24, 2004.
DOI : 10.1109/IPDPS.2004.1302934

H. Song, L. Xie, S. Zhu, and G. Cao, Sensor node compromise detection, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, pp.242-247, 2007.
DOI : 10.1145/1280940.1280993

G. Thamilarasu, A. Balasubramanian, S. Mishra, and R. Sridhar, A cross-layer based intrusion detection approach for wireless ad hoc networks, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., p.7, 2005.
DOI : 10.1109/MAHSS.2005.1542882

C. Tseng, T. Song, P. Balasubramanyam, C. Ko, and K. Levitt, A Specification-Based Intrusion Detection Model for OLSR, Recent Advances in Intrusion Detection, pp.330-350, 2006.
DOI : 10.1007/11663812_17

C. Tseng, S. Wang, C. Ko, and K. Levitt, DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET, Recent Advances in Intrusion Detection, pp.249-271, 2006.
DOI : 10.1007/11856214_13

C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe et al., A specification-based intrusion detection system for AODV, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.125-134, 2003.
DOI : 10.1145/986858.986876

URL : http://seclab.cs.ucdavis.edu/papers/new_aodvids-v1.pdf

D. Wagner and P. Soto, Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.255-264, 2002.
DOI : 10.1145/586110.586145

URL : http://www.cs.jhu.edu/~fabian/courses/CS600.424/course_papers/wagner02mimicry.pdf

Y. Yang, X. Wang, S. Zhu, and G. Cao, Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.219-230, 2007.
DOI : 10.1109/SRDS.2007.31