R. Aleliunas, R. Karp, R. Lipton, L. Lovasz, and C. Rackoff, Random walks, universal traversal sequences, and the complexity of maze problems, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), pp.218-223, 1979.
DOI : 10.1109/SFCS.1979.34

K. Altisen, S. Devismes, R. Jamet, and P. Lafourcade, SR3 : A secure and resilient reputation-based routing protocol, 2013.
DOI : 10.1109/dcoss.2013.33

B. Blanchet, A Computationally Sound Mechanized Prover for Security Protocols, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.193-207, 2008.
DOI : 10.1109/TDSC.2007.1005

P. Bose, P. Morin, I. Stojmenovi´cstojmenovi´c, and J. Urrutia, wireless networks, Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications , DIALM '99, pp.609-616, 2001.
DOI : 10.1145/313239.313282

T. Eisenbarth and S. Kumar, A survey of lightweight-cryptography implementations. Design & Test of Computers, IEEE, vol.24, issue.6, pp.522-533, 2007.

O. Erdene-ochir, A. Kountouris, M. Minier, and F. Valois, Enhancing resiliency against routing layer attacks in wireless sensor networks: Gradient-based routing in focus, International Journal On Advances in Networks and Services, vol.4, issue.1 2, pp.38-54, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00643873

O. Erdene-ochir, M. Minier, F. Valois, and A. Kountouris, Resiliency of wireless sensor networks: Definitions and analyses, 2010 17th International Conference on Telecommunications, pp.828-835, 2010.
DOI : 10.1109/ICTEL.2010.5478822

URL : https://hal.archives-ouvertes.fr/inria-00524365

O. Erdene-ochir, M. Minier, F. Valois, and A. Kountouris, Toward Resilient Routing in Wireless Sensor Networks: Gradient-Based Routing in Focus, 2010 Fourth International Conference on Sensor Technologies and Applications, pp.478-483, 2010.
DOI : 10.1109/SENSORCOMM.2010.77

URL : https://hal.archives-ouvertes.fr/inria-00524370

Y. Hu, A. Perrig, and D. Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005.
DOI : 10.1145/570645.570648

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

D. Liu and P. Ning, Multilevel ??TESLA, ACM Transactions on Embedded Computing Systems, vol.3, issue.4, pp.800-836, 2004.
DOI : 10.1145/1027794.1027800

V. S. Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology CRYPTO 85 Proceedings, pp.417-426, 1986.
DOI : 10.1007/3-540-39799-X_31

P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad hoc Networks, Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.193-204, 2002.

A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

C. Schurgers and M. Srivastava, Energy efficient routing in wireless sensor networks, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.357-361, 2001.
DOI : 10.1109/MILCOM.2001.985819