Wireless mesh networks: a survey, Computer Networks, vol.47, issue.4, pp.445-487, 2005. ,
A Comparison of Clock Synchronization in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, vol.2013, 2013. ,
Timing-sync Protocol for Sensor Networks, The First ACM Conference on Embedded Networked Sensor Systems (SenSys), pp.138-149, 2003. ,
The Flooding Synchronization Protocol, Second ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004. ,
TSMP: Time Synchronized Mesh Protocol, Proceedings of the IASTED International Symposium on Distributed Sensor Networks (DSN08), 2008. ,
Cross-Layered Synchronization Protocol for Wireless Sensor Networks, Ninth International Conference on, Menuires, pp.167-172, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00470323
Time Synchronization Based on SlowFlooding in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.244-253, 2014. ,
Consensus Clock Synchronization for Wireless Sensor Networks, IEEE Sensors Journal, vol.12, issue.6, pp.2269-2277, 2012. ,
Fine-Grained Network Time Synchronization using Reference Broadcast, The Fifth Symposium on Operating Systems Design and Implementation (OSDI), pp.147-163, 2002. ,
, Time Synchronization in Wireless Networks, 2006.
SiSP: A lightweight synchronization protocol for Wireless Sensor Networks, 16 th IEEE conference on Emerging Technologies & Factory Automation (ETFA), 2011. ,
Lightweight trusted routing for wireless sensor networks, Progress in Artificial Intelligence, pp.193-202, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00687765
Management and applications of trust in Wireless Sensor Networks: A survey, J. Comput. Syst. Sci, vol.80, issue.3, pp.602-617, 2014. ,
,
,
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection, IEEE Transactions on Network and Service Management, vol.9, issue.2, pp.169-183, 2012. ,
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, IEEE Trans. Dependable Sec. Comput, vol.12, issue.1, pp.98-110, 2015. ,
KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network, Proceedings of the Second International Conference on Computer and Communication Technologies, vol.379, pp.679-690, 2015. ,
Effect of MAC layer protocol in building trust and reputation scheme in mobile ad hoc network, Nirma University International Conference on, pp.1-3, 2013. ,
Lightweight Trusted Routing for Wireless Sensor Networks, Advances on Practical Applications of Agents and Multiagent Systems-9th International Conference on Practical Applications of Agents and Multiagent Systems, pp.87-96, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00641692
Decentralized Intelligent Real World Embedded Systems: A Tool to Tune Design and Deployment, Advances on Practical Applications of Agents and MultiAgent Systems, pp.133-144, 2013. ,
DOI : 10.1007/978-3-642-38073-0_12
URL : https://hal.archives-ouvertes.fr/hal-00804649
Meeting the challenges of decentralised embedded applications using multi-agent systems, International Journal of Agent-Oriented Software Engineering, vol.5, issue.1, pp.22-68, 2015. ,
DOI : 10.1504/ijaose.2015.078435
URL : https://doi.org/10.1504/ijaose.2015.078435