, Anastasi et al: Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks 7, pp.537-668, 2009.
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of Network and Computer Applications, vol.32, issue.2, pp.377-387, 2009. ,
DOI : 10.1016/j.jnca.2008.02.017
A novel node level security policy framework for wireless sensor networks, Journal of Network and Computer Applications, vol.34, issue.1, pp.418-428, 2011. ,
DOI : 10.1016/j.jnca.2010.03.004
Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, 2011. ,
DOI : 10.1109/LCN.2011.6115506
Security considerations in ad hoc sensor networks, Ad Hoc Networks 3, pp.69-89, 2005. ,
DOI : 10.1016/j.adhoc.2003.09.009
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks, Proceedings of International Conference on Networking, pp.467-474, 2005. ,
DOI : 10.1007/978-3-540-31956-6_55
Ozdemir and Y. Xiao: Secure data aggregation in wireless sensor networks: A comprehensive overview, Efficient Communication Protocol for Wireless Microsensor Networks Proceedings of the IEEE Hawaii international conference on system sciences, pp.2022-2037, 2000. ,
, Younis and S. Fahmy: HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks, IEEE Trans. Mobile Comput, vol.3, issue.4, pp.366-379, 2004.
Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks Liang: Efficient Temporal Compression in Wireless Sensor Networks, 36th Annual IEEE Conference on Local Computer Networks Hsin Lai and C-M. Chen: Detecting Denial of Service Attacks in Sensor Networks, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00643427
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364158
URL : https://hal.archives-ouvertes.fr/hal-01791244
Energy efficient and QoS aware medium access control for wireless sensor networks, Mohi, A. Movaghar and P.M. Zadeh: A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks. International Conference on Communications and Mobile Computing, pp.1252-1266, 2009. ,
DOI : 10.1201/9781420035094
Distributed Detection of Node Capture Attacks in Wireless Networks. Smart Wireless Sensor Networks, 2010. ,
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers and Mathematics with Applications, vol.60, pp.294-306, 2010. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001. ,
DOI : 10.1145/381677.381696
Oliveira et al: SecLEACH ? On the security of clustered sensor networks, Signal Processing, vol.87, pp.2882-2895, 2007. ,
, Islam et al: Optimal Sensor Placement for Detection against Distributed Denial of Service Attacks, Pak. J. Engg. & Appl. Sci, vol.4, pp.80-92, 2009.
Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010. ,
DOI : 10.1016/j.comcom.2010.03.027
Adaptive security design with malicious node detection in cluster-based sensor networks, Computer Communications, vol.30, issue.11-12, pp.2385-2400, 2007. ,
DOI : 10.1016/j.comcom.2007.04.008
Timmerman: Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection, Proceedings of the 4th IEEE conference on Mobile and Wireless Communications Networks, 2002. ,
Lavallée: Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for WSN, 2011. ,
Pekergin: HASL: An Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), 2011. ,
DOI : 10.4108/icst.valuetools.2011.245710
URL : http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf
Pekergin: COSMOS: a Statistical Model Checker for the Hybrid Automata Stochastic Logic, Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST11), 2011. ,
DOI : 10.1109/qest.2011.24
URL : http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf
Networks 0000 DOI: 10.1002/sec Prepared using secauth.cls [NS2]. The Network Simulator NS-2 Modelling with Generalized Stochastic Petri Nets, pp.1-17, 1995. ,
, Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks
, Journal of Computational ScienceJOCS)
Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, pp.10-1002, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01277562
IBC- HWMP: a novel secure identity-based cryptographybased scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. Concurrency and Computation: Practice and Experience, Dessart, H. Fouchal, P. Hunel et N. Vidot: Anomaly Detection with Wireless Sensor Networks The 9th IEEE International Symposium on Network Computing and Applications, 2010. ,
A low energy consumption MAC protocol for WSN, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6363918
Stochastic Model Checking, In book " Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS, vol.4486, 2007. ,
Peled: Model Checking, 1999. ,
Networks 0000, pp.1-17 ,
, DOI: 10.1002/sec Prepared using secauth