J. Ben-othman and B. Yahya, Energy efficient and QoS based routing protocol for wireless sensor networks, Journal of Parallel and Distributed Computing, vol.70, issue.8, pp.849-857, 2010.
DOI : 10.1016/j.jpdc.2010.02.010

T. Bernard and H. Fouchal, A low energy consumption MAC protocol for WSN, 2012 IEEE International Conference on Communications (ICC), pp.533-537, 2012.
DOI : 10.1109/ICC.2012.6363918

R. William, D. Claycomb, and . Shin, A novel node level security policy framework for wireless sensor networks, Journal of Network and Computer Applications, vol.34, issue.1, pp.418-428, 2011.

M. A. Simplicio, B. T. Jr, P. S. De-oliveira, C. B. Barreto, . Margi et al., Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.454-461, 2011.
DOI : 10.1109/LCN.2011.6115506

J. Ben-othman, K. Bessaoud, A. Bui, and P. , Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks, Journal of Computational Science, vol.4, issue.4, pp.199-208, 2013.
DOI : 10.1016/j.jocs.2012.01.003

F. Hu and N. K. Sharma, Security considerations in ad hoc sensor networks, Ad Hoc Networks, pp.69-89, 2005.
DOI : 10.1016/j.adhoc.2003.09.009

W. Rabiner-heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000.
DOI : 10.1109/HICSS.2000.926982

S. Ozdemir and Y. Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009.
DOI : 10.1016/j.comnet.2009.02.023

O. Younis and S. Fahmy, HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004.
DOI : 10.1109/TMC.2004.41

URL : http://people.cs.vt.edu/~irchen/6204/paper/HEED-tmc04.pdf

S. Fouchal and I. Lavallée, Fast and flexible unsupervised clustering algorithm based on ultrametric properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet'11), 2011.
DOI : 10.1145/2069105.2069112

URL : https://hal.archives-ouvertes.fr/hal-00643427

S. Fouchal, Q. Monnet, D. Mansouri, L. Mokdad, and M. Ioualalen, A new clustering algorithm for wireless sensor networks, Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12), 2012.

Y. Liang, Efficient temporal compression in wireless sensor networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.470-478, 2011.
DOI : 10.1109/LCN.2011.6115508

L. Gu-hsin and C. Chen, Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008.

M. Guechari, L. Mokdad, and S. Tan, Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364158

URL : https://hal.archives-ouvertes.fr/hal-01791244

S. Ahmad-yusri-dak, M. Yahya, and . Kassim, A literature survey on security challenges in VANETs, International Journal of Computer Theory and Engineering, vol.4, issue.6, pp.1007-1010, 2012.

S. Alam and D. De, Analysis of Security Threats in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.6, issue.2, pp.35-46, 2014.
DOI : 10.5121/ijwmn.2014.6204

A. A. Soufiene-ben-othman, A. Bahattab, H. Trad, and . Youssef, Confidentiality and integrity for data aggregation in WSN using homomorphic encryption. Wireless Personal Communications, 2014.

Q. Monnet, L. Mokdad, and J. Ben-othman, Data protection in multipath WSNs, 2013 IEEE Symposium on Computers and Communications (ISCC), 2013.
DOI : 10.1109/ISCC.2013.6754926

URL : https://hal.archives-ouvertes.fr/hal-01132734

H. Shi, W. Wang, N. Kwok, and S. Chen, Game Theory for Wireless Sensor Networks: A Survey, Sensors, vol.2, issue.7, pp.9055-9097, 2012.
DOI : 10.1016/j.pmcj.2005.12.001

P. Guo, J. Wang, J. Zhu, and Y. Cheng, Authentication mechanism on wireless sensor networks: A survey, Proceedings of the 2nd International Conference on Information Technology and Computer Science (ITCS'13), pp.425-431, 2013.

P. Guo, J. Wang, J. Zhu, Y. Cheng, and J. Kim, Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, International Journal of Security and Its Applications, vol.7, issue.5, pp.225-236, 2013.
DOI : 10.14257/ijsia.2013.7.5.21

URL : https://doi.org/10.14257/ijsia.2013.7.5.21

H. Bawa, P. Singh, and R. Kumar, An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN, International Journal of Computer Network and Information Security, vol.5, issue.1, pp.56-64, 2013.
DOI : 10.5815/ijcnis.2013.01.07

URL : http://www.mecs-press.org/ijcnis/ijcnis-v5-n1/IJCNIS-V5-N1-7.pdf

L. Kazatzopoulos, C. Delakouridis, and C. Anagnostopoulos, WSN location privacy scheme enhancement through epidemical information dissemination, International Journal of Communication Networks and Information Security, vol.6, issue.2, pp.162-167, 2014.

C. Mary, G. , and M. Kumar, Cluster based location privacy in wireless sensor networks against a universal adversary, Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES'13), pp.288-293, 2013.

A. Varshovi and B. Sadeghiyan, Ontological classification of network denial of service attacks: Basis for a unified detection framework, Scientia Iranica, vol.17, issue.2, pp.133-148, 2010.

M. P. Shio-kumar-singh, D. K. Singh, and . Singh, A survey on network security and attack defense mechanism for wireless sensor networks, International Journal of Computer Trends and Technology, 2011.

M. Momani and S. Challa, Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010.
DOI : 10.5121/ijasuc.2010.1301

URL : http://airccse.org/journal/ijasuc/papers/0910ijasuc01.pdf

M. , C. Fernández-gago, R. Román, and J. Lopez, A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU'07), pp.25-30, 2007.

M. R. Mohammad-reza-rohbanian, A. Kharazmi, M. Keshavarz-haddad, and . Keshtgary, Watchdog-LEACH: A new method based on LEACH protocol to secure clustered wireless sensor networks Advances in Computer Science, An International Journal, vol.2, issue.3, pp.105-117, 2013.

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, SPINS: Security Protocols for Sensor Networks. Wireless Networks, pp.521-534, 2002.

K. Muhammad-hasan-islam, S. A. Nadeem, and . Khan, Optimal sensor placement for detection against distributed denial of service attacks, Proceedings of the 2009 International Conference on Advanced Computer Control (ICACC'09), pp.675-679, 2009.

J. Ho, Distributed Detection of Node Capture Attacks in Wireless Sensor Networks, Smart Wireless Sensor Networks, pp.345-360, 2010.
DOI : 10.5772/13084

S. Misra, P. Venkata-krishna, K. I. Abraham, N. Sasikumar, and S. Fredun, An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010.
DOI : 10.1016/j.camwa.2009.12.035

J. Son, H. Luo, and S. Seo, Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010.
DOI : 10.1016/j.comcom.2010.03.027

A. Ghosal and S. Dasbit, A lightweight security scheme for query processing in clustered wireless sensor networks, Computers & Electrical Engineering, vol.41, 2014.
DOI : 10.1016/j.compeleceng.2014.03.014

A. Ahmed, A. , and M. Younis, A survey on clustering algorithms for wireless sensor networks, Computer Communications, vol.30, pp.14-15, 2007.

M. J. Handy, M. Haase, and D. Timmerman, Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002.
DOI : 10.1109/MWCN.2002.1045790

URL : http://www.imd.uni-rostock.de/veroeff/MWCN2002.pdf

B. , B. Reddy, and K. Rao, A modified clustering for LEACH algorithm in WSN, International Journal of Advanced Computer Science and Applications, vol.4, issue.5, pp.79-83, 2013.

N. Chawla and A. Jasuja, Algorithm for optimizing first node die (FND) time in LEACH protocol, International Journal of Current Engineering and Technology, vol.4, issue.4, pp.2748-2750, 2014.

L. B. Oliveira, A. Ferreira, M. A. Vilaça, C. Hao, M. Wong et al., SecLEACH???On the security of clustered sensor networks, Signal Processing, vol.87, issue.12, pp.2882-2895, 2007.
DOI : 10.1016/j.sigpro.2007.05.016

M. Mohi, A. Movaghar, and P. Zadeh, A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks, 2009 WRI International Conference on Communications and Mobile Computing, 2009.
DOI : 10.1109/CMC.2009.325

G. Anastasi, M. Conti, M. Di-francesco, and A. Passarella, Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, pp.537-568, 2009.
DOI : 10.1016/j.adhoc.2008.06.003

P. Sivakumar, K. Amirthavalli, and M. Senthil, Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach, International Journal of Distributed Sensor Networks, vol.1, issue.9, 2014.
DOI : 10.1080/15501320902876055

URL : http://journals.sagepub.com/doi/pdf/10.1155/2014/319587

Q. Monnet and L. Mokdad, DoS detection in WSNs, 2015.
DOI : 10.1016/B978-0-12-800887-4.00028-6

URL : https://hal.archives-ouvertes.fr/hal-01318714

J. Rehana, Security of wireless sensor network, 2009.

D. Rakhmatov and S. Vrudhula, An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001.
DOI : 10.1109/ICCAD.2001.968687

P. Ballarini, L. Mokdad, and Q. Monnet, Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013.
DOI : 10.1016/j.comcom.2007.04.008

URL : https://hal.archives-ouvertes.fr/hal-00832082

Q. Monnet, Mechanisms and Modeling Tools for Protection Against Denial of Service Attacks in Wireless Sensor Networks, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01314203