Energy efficient and QoS based routing protocol for wireless sensor networks, Journal of Parallel and Distributed Computing, vol.70, issue.8, pp.849-857, 2010. ,
DOI : 10.1016/j.jpdc.2010.02.010
A low energy consumption MAC protocol for WSN, 2012 IEEE International Conference on Communications (ICC), pp.533-537, 2012. ,
DOI : 10.1109/ICC.2012.6363918
A novel node level security policy framework for wireless sensor networks, Journal of Network and Computer Applications, vol.34, issue.1, pp.418-428, 2011. ,
Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.454-461, 2011. ,
DOI : 10.1109/LCN.2011.6115506
Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks, Journal of Computational Science, vol.4, issue.4, pp.199-208, 2013. ,
DOI : 10.1016/j.jocs.2012.01.003
Security considerations in ad hoc sensor networks, Ad Hoc Networks, pp.69-89, 2005. ,
DOI : 10.1016/j.adhoc.2003.09.009
Energy-efficient communication protocol for wireless microsensor networks, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000. ,
DOI : 10.1109/HICSS.2000.926982
Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009. ,
DOI : 10.1016/j.comnet.2009.02.023
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004. ,
DOI : 10.1109/TMC.2004.41
URL : http://people.cs.vt.edu/~irchen/6204/paper/HEED-tmc04.pdf
Fast and flexible unsupervised clustering algorithm based on ultrametric properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet'11), 2011. ,
DOI : 10.1145/2069105.2069112
URL : https://hal.archives-ouvertes.fr/hal-00643427
A new clustering algorithm for wireless sensor networks, Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12), 2012. ,
Efficient temporal compression in wireless sensor networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.470-478, 2011. ,
DOI : 10.1109/LCN.2011.6115508
Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008. ,
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364158
URL : https://hal.archives-ouvertes.fr/hal-01791244
A literature survey on security challenges in VANETs, International Journal of Computer Theory and Engineering, vol.4, issue.6, pp.1007-1010, 2012. ,
Analysis of Security Threats in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.6, issue.2, pp.35-46, 2014. ,
DOI : 10.5121/ijwmn.2014.6204
Confidentiality and integrity for data aggregation in WSN using homomorphic encryption. Wireless Personal Communications, 2014. ,
Data protection in multipath WSNs, 2013 IEEE Symposium on Computers and Communications (ISCC), 2013. ,
DOI : 10.1109/ISCC.2013.6754926
URL : https://hal.archives-ouvertes.fr/hal-01132734
Game Theory for Wireless Sensor Networks: A Survey, Sensors, vol.2, issue.7, pp.9055-9097, 2012. ,
DOI : 10.1016/j.pmcj.2005.12.001
Authentication mechanism on wireless sensor networks: A survey, Proceedings of the 2nd International Conference on Information Technology and Computer Science (ITCS'13), pp.425-431, 2013. ,
Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, International Journal of Security and Its Applications, vol.7, issue.5, pp.225-236, 2013. ,
DOI : 10.14257/ijsia.2013.7.5.21
URL : https://doi.org/10.14257/ijsia.2013.7.5.21
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN, International Journal of Computer Network and Information Security, vol.5, issue.1, pp.56-64, 2013. ,
DOI : 10.5815/ijcnis.2013.01.07
URL : http://www.mecs-press.org/ijcnis/ijcnis-v5-n1/IJCNIS-V5-N1-7.pdf
WSN location privacy scheme enhancement through epidemical information dissemination, International Journal of Communication Networks and Information Security, vol.6, issue.2, pp.162-167, 2014. ,
Cluster based location privacy in wireless sensor networks against a universal adversary, Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES'13), pp.288-293, 2013. ,
Ontological classification of network denial of service attacks: Basis for a unified detection framework, Scientia Iranica, vol.17, issue.2, pp.133-148, 2010. ,
A survey on network security and attack defense mechanism for wireless sensor networks, International Journal of Computer Trends and Technology, 2011. ,
Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010. ,
DOI : 10.5121/ijasuc.2010.1301
URL : http://airccse.org/journal/ijasuc/papers/0910ijasuc01.pdf
A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU'07), pp.25-30, 2007. ,
Watchdog-LEACH: A new method based on LEACH protocol to secure clustered wireless sensor networks Advances in Computer Science, An International Journal, vol.2, issue.3, pp.105-117, 2013. ,
, SPINS: Security Protocols for Sensor Networks. Wireless Networks, pp.521-534, 2002.
Optimal sensor placement for detection against distributed denial of service attacks, Proceedings of the 2009 International Conference on Advanced Computer Control (ICACC'09), pp.675-679, 2009. ,
Distributed Detection of Node Capture Attacks in Wireless Sensor Networks, Smart Wireless Sensor Networks, pp.345-360, 2010. ,
DOI : 10.5772/13084
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010. ,
DOI : 10.1016/j.camwa.2009.12.035
Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010. ,
DOI : 10.1016/j.comcom.2010.03.027
A lightweight security scheme for query processing in clustered wireless sensor networks, Computers & Electrical Engineering, vol.41, 2014. ,
DOI : 10.1016/j.compeleceng.2014.03.014
A survey on clustering algorithms for wireless sensor networks, Computer Communications, vol.30, pp.14-15, 2007. ,
Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002. ,
DOI : 10.1109/MWCN.2002.1045790
URL : http://www.imd.uni-rostock.de/veroeff/MWCN2002.pdf
A modified clustering for LEACH algorithm in WSN, International Journal of Advanced Computer Science and Applications, vol.4, issue.5, pp.79-83, 2013. ,
Algorithm for optimizing first node die (FND) time in LEACH protocol, International Journal of Current Engineering and Technology, vol.4, issue.4, pp.2748-2750, 2014. ,
SecLEACH???On the security of clustered sensor networks, Signal Processing, vol.87, issue.12, pp.2882-2895, 2007. ,
DOI : 10.1016/j.sigpro.2007.05.016
A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks, 2009 WRI International Conference on Communications and Mobile Computing, 2009. ,
DOI : 10.1109/CMC.2009.325
Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, pp.537-568, 2009. ,
DOI : 10.1016/j.adhoc.2008.06.003
Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach, International Journal of Distributed Sensor Networks, vol.1, issue.9, 2014. ,
DOI : 10.1080/15501320902876055
URL : http://journals.sagepub.com/doi/pdf/10.1155/2014/319587
DoS detection in WSNs, 2015. ,
DOI : 10.1016/B978-0-12-800887-4.00028-6
URL : https://hal.archives-ouvertes.fr/hal-01318714
Security of wireless sensor network, 2009. ,
An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001. ,
DOI : 10.1109/ICCAD.2001.968687
Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013. ,
DOI : 10.1016/j.comcom.2007.04.008
URL : https://hal.archives-ouvertes.fr/hal-00832082
Mechanisms and Modeling Tools for Protection Against Denial of Service Attacks in Wireless Sensor Networks, 2015. ,
URL : https://hal.archives-ouvertes.fr/tel-01314203