, Anastasi et al: Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks 7, pp.537-668, 2009.

L. [. Li and . Batten, Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of Network and Computer Applications, vol.32, issue.2, pp.377-387, 2009.
DOI : 10.1016/j.jnca.2008.02.017

D. [. Claycomb and . Shin, A novel node level security policy framework for wireless sensor networks, Journal of Network and Computer Applications, vol.34, issue.1, pp.418-428, 2011.
DOI : 10.1016/j.jnca.2010.03.004

. [. Simplicio-jr, Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, 2011.
DOI : 10.1109/LCN.2011.6115506

N. [. Hu and . Sharma, Security considerations in ad hoc sensor networks, Ad Hoc Networks 3, pp.69-89, 2005.
DOI : 10.1016/j.adhoc.2003.09.009

D. [. Ai, L. Turgut, and . Bölöni, A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks, Proceedings of International Conference on Networking, pp.467-474, 2005.
DOI : 10.1007/978-3-540-31956-6_55

. [. Heinzelman, Ozdemir and Y. Xiao: Secure data aggregation in wireless sensor networks: A comprehensive overview, Efficient Communication Protocol for Wireless Microsensor Networks Proceedings of the IEEE Hawaii international conference on system sciences, pp.2022-2037, 2000.

, Younis and S. Fahmy: HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks, IEEE Trans. Mobile Comput, vol.3, issue.4, pp.366-379, 2004.

I. [. Fouchal and . Lavallée, Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks Liang: Efficient Temporal Compression in Wireless Sensor Networks, 36th Annual IEEE Conference on Local Computer Networks Hsin Lai and C-M. Chen: Detecting Denial of Service Attacks in Sensor Networks, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00643427

L. [. Guechari, S. Mokdad, and . Tan, Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364158

URL : https://hal.archives-ouvertes.fr/hal-01791244

[. Yahya and J. Ben-othman, Energy efficient and QoS aware medium access control for wireless sensor networks, Mohi, A. Movaghar and P.M. Zadeh: A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks. International Conference on Communications and Mobile Computing, pp.1252-1266, 2009.
DOI : 10.1201/9781420035094

[. Ho, Distributed Detection of Node Capture Attacks in Wireless Networks. Smart Wireless Sensor Networks, 2010.

. S. Sm10-] and . Misra, An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers and Mathematics with Applications, vol.60, pp.294-306, 2010.

. [. Perrig, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001.
DOI : 10.1145/381677.381696

. [. , Oliveira et al: SecLEACH ? On the security of clustered sensor networks, Signal Processing, vol.87, pp.2882-2895, 2007.

, Islam et al: Optimal Sensor Placement for Detection against Distributed Denial of Service Attacks, Pak. J. Engg. & Appl. Sci, vol.4, pp.80-92, 2009.

[. Son, Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010.
DOI : 10.1016/j.comcom.2010.03.027

[. Hsieh, Adaptive security design with malicious node detection in cluster-based sensor networks, Computer Communications, vol.30, issue.11-12, pp.2385-2400, 2007.
DOI : 10.1016/j.comcom.2007.04.008

M. [. Handy and D. Haase, Timmerman: Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection, Proceedings of the 4th IEEE conference on Mobile and Wireless Communications Networks, 2002.

. S. Sf11-] and I. Fouchal, Lavallée: Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for WSN, 2011.

H. [. Ballarini, M. Djafr, S. Duflot, and N. Haddad, Pekergin: HASL: An Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), 2011.
DOI : 10.4108/icst.valuetools.2011.245710

URL : http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf

H. [. Ballarini, M. Djafr, S. Duflot, and N. Haddad, Pekergin: COSMOS: a Statistical Model Checker for the Hybrid Automata Stochastic Logic, Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST11), 2011.
DOI : 10.1109/qest.2011.24

URL : http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf

S. Comm, G. Balbo, G. Conte, S. Donatelli, and G. Franceschinis, Networks 0000 DOI: 10.1002/sec Prepared using secauth.cls [NS2]. The Network Simulator NS-2 Modelling with Generalized Stochastic Petri Nets, pp.1-17, 1995.

. J. Bbbp12-], K. Ben-othman, A. Bessaoud, L. Bui, and . Pilard, Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks

, Journal of Computational ScienceJOCS)

H. [. Fouchal and Z. Habbas, Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, pp.10-1002, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01277562

. J. Bb12-], Y. Ben-othman, . Saavedra, and . Benitez, IBC- HWMP: a novel secure identity-based cryptographybased scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience, Dessart, H. Fouchal, P. Hunel et N. Vidot: Anomaly Detection with Wireless Sensor Networks The 9th IEEE International Symposium on Network Computing and Applications, 2010.

H. [. Bernard and . Fouchal, A low energy consumption MAC protocol for WSN, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6363918

]. M. Knp07a, G. Kwiatkowska, D. Norman, and . Parker, Stochastic Model Checking, In book " Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS, vol.4486, 2007.

O. [. Clarke and D. A. Grumberg, Peled: Model Checking, 1999.

S. Comm, Networks 0000, pp.1-17

, DOI: 10.1002/sec Prepared using secauth