P. Papadimitratos and Z. Haas, Handbook of ad hoc wireless networks, chapter Securing mobile ad hoc networks, 2002.

F. Adelstein, S. K. Gupta, G. G. Richard, and I. , Fundamentals of mobile and pervasive computing, 2005.

D. Djenouri, L. Khelladi, and A. N. Badache, A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications surveys & tutorials, vol.7, issue.4, pp.2-28, 2005.

C. E. Perkins, Ad hoc networking: an introduction, 2001.

L. Zhou and Z. J. Haas, Securing ad hoc networks, IEEE network, vol.13, issue.6, pp.24-30, 1999.

J. Douceur, The sybil attack, Proceedings of the international workshop on peer-to-peer systems (IPTPS), 2002.

H. Yang, H. Luo, J. Kong, F. Ye, P. Zerfos et al., Ad hoc network security: challenges and solutions, 2004.

B. Wu, J. Chen, J. Wu, and M. Cardei, Wireless/mobile network security, chapter A survey on attacks and countermeasures in mobile ad hoc networks, 2006.

P. Argyroudis and D. O'mahony, Secure routing for mobile ad hoc networks, IEEE Communications surveys & tutorials, vol.7, issue.3, pp.2-21, 2005.

I. Khalil, S. Bagchi, and C. Nita-rotaru, DICAS: detection, diagnosis and isolation of control attacks in sensor networks, Proceedings of the international conference on security and privacy in communication networks (SECURECOMM), pp.89-100, 2005.

R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff et al., Survivable network systems: an emerging discipline (cmu/sei-97-tr-013), 1997.

P. E. Veríssimo, N. F. Neves, and M. P. Correia, Intrusion-tolerant architectures: concepts and design, 2003.

N. A. Boudriga and M. S. Obaidat, Fault and intrusion tolerance in wireless ad hoc networks, Proceedings of IEEE wireless communications and networking conference (WCNC), vol.4, pp.2281-2286, 2005.

Y. Deswarte and D. Powell, Internet security: an intrusion-tolerance approach, Proceedings of the IEEE, vol.94, issue.2, pp.432-441, 2006.

, Malicious-and accidental-fault tolerance for internet applications, 2006.

, Organically assured and survivable information system (OASIS), 2006.

J. P. Sterbenz, R. Krishnan, R. R. Hain, A. W. Jackson, D. Levin et al., Survivable mobile wireless networks: issues, challenges, and research directions, Proceedings of ACM workshop on wireless security (WiSe), pp.31-40, 2002.

J. Laprie and B. Randell, Basic concepts and taxonomy of dependable and secure computing, IEEE transaction dependable security computer, vol.1, issue.1, pp.11-33, 2004.

P. Veríssimo, Intrusion tolerance: concepts and design principles, 2002.

J. Fraga and D. Powell, A fault-and intrusion-tolerant file system, Proceedings of the international conference on computer security, pp.203-218, 1985.

J. C. Laprie, Dependability: basic concepts and terminology in English, French, German, Italian, and Japanese (Dependable computing and faulttolerant systems), 1991.

A. Avizienis, J. Laprie, and B. Randell, Dependability and its threats -a taxonomy, IFIP congress topical sessions, pp.91-120, 2004.

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-rotaru, and H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks, 2004.

C. E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, Proceedings of IEEE workshop on mobile computing systems and applications (WMCSA), p.90, 1999.

D. Johnson, D. Maltz, and J. Broch, DSR -the dynamic source routing protocol for multihop wireless ad hoc networks, pp.139-172, 2001.

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, The TESLA broadcast authentication protocol, RSA CryptoBytes, vol.5, issue.2, 2002.

Y. Hu, D. Johnson, and A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, vol.1, pp.175-192, 2003.

Y. Hu, A. Perrig, and D. B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless networks, vol.11, pp.21-38, 2005.

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-hashing for message authentication. RFC 2104, Internet Engineering Task Force, 1997.

P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks, Proceeding of communication networks and distributed systems modeling and simulation (CNDS), 2002.

P. Kotzanikolaou, R. Mavropodi, and C. Douligeris, Secure multipath routing for mobile ad hoc networks, Proceedings of the conference on wireless ondemand network systems and services (WONS), pp.89-96, 2005.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the international conference on mobile computing and networking (MobiCom), pp.255-265, 2000.

M. Just, E. Kranakis, and T. Wan, Resisting malicious packet dropping in wireless ad hoc networks, Proceedings of the international conference on AD-HOC networks & wireless (ADHOC-NOW), pp.151-163, 2003.

B. Hofmann-wellenhof, H. Lichteneeger, and J. Collins, Global Positioning System: Theory and Practice, 2001.

Y. C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, Proceedings of the IEEE computer and communications societies (INFOCOM), vol.3, pp.1976-1986, 2003.

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, Proceedings of the network and distributed system security symposium (NDSS), pp.89-96, 2004.

R. C. Linger, N. R. Mead, and H. F. Lipson, Requirements definition for survivable network systems, Proceedings of the international conference on requirements engineering (ICRE), pp.0-14, 1998.

T. Anantvalee and J. Wu, Wireless/mobile network security, chapter A survey on intrusion detection in mobile ad hoc networks, 2006.

A. Mishra, K. Nadkarni, and A. Patcha, Intrusion detection in wireless ad hoc networks, vol.11, pp.48-60, 2004.

R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, Bootstrapping security associations for routing in mobile ad-hoc networks, Proceedings of the global telecommunications conference (GLOBECOM), vol.3, pp.1511-1515, 2003.

M. G. Zapata, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, pp.106-107, 2002.

S. Yi, P. Naldurg, and R. Kravets, Security-aware ad hoc routing for wireless networks, Proceedings of the ACM international symposium on mobile ad hoc networking & computing (MobiHoc), pp.299-302, 2001.

R. Ramanujan, S. Kudige, and T. Nguyen, Techniques for intrusion-resistant ad hoc routing algorithms TIARA, DARPA information survivability conference and exposition (DISCEX), vol.02, pp.98-100, 2003.

Y. Xue and K. Nahrstedt, Providing fault-tolerant ad hoc routing service in adversarial environments. Wireless personal communications: an international journal, vol.29, pp.367-388, 2004.

B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, and C. Nita-rotaru, On the survivability of routing protocols in ad hoc wireless networks, Proceedings of the international conference on security and privacy in communication networks (SECURECOMM), pp.327-338, 2005.

L. Buttyán and J. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile network application, vol.8, pp.579-592, 2003.

H. Miranda and L. Rodrigues, Friends and foes: preventing selfishness in open mobile ad hoc networks, Proceedings of international conference on distributed computing systems workshops (ICDCSW), vol.00, p.440, 2003.

S. Zhong, J. Chen, and Y. R. Yang, SPRITE: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of the IEEE computer and communications societies (INFOCOM), vol.3, pp.1987-1997, 2003.

P. Michiardi and R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, pp.107-121, 2002.

S. Buchegger and J. Boudec, Performance analysis of the CONFIDANT protocol: cooperation of nodes -fairness in dynamic ad-hoc networks, Proceedings of IEEE/ACM symposium on mobile ad hoc networking and computing (MobiHoc), 2002.

W. Lou, W. Liu, and Y. Fang, SPREAD: enhancing data confidentiality in mobile ad hoc networks, Proceedings of the IEEE computer and communications societies (INFOCOM), 2004.

P. Papadimitratos and Z. J. Haas, Secure data transmission in mobile ad hoc networks, Proceedings of the 2003 ACM workshop on wireless security (WiSe), pp.41-50, 2003.

R. Choudhury, X. Yang, R. Ramanathan, and N. H. Vaidya, On designing MAC protocols for wireless networks using directional antennas, IEEE transactions on mobile computing, vol.5, issue.5, pp.477-491, 2006.

V. Berman and B. Mukherjee, Data security in MANETs using multipath routing and directional transmission, Proceedings of IEEE international conference on communications (ICC), vol.5, pp.2322-2328, 2006.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

D. Maughan, M. Schertler, M. Schneider, and J. Turner, Internet security association and key management protocol (ISAKMP). RFC 2408, Internet Engineering Task Force, 1998.

M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, Journal ACM, vol.36, issue.2, pp.335-348, 1989.

E. Ayanoglu, I. Chih-lin, R. D. Gitlin, and J. E. Mazo, Diversity coding for transparent self-healing and fault-tolerant communication networks, IEEE Transactions on Communications, vol.41, issue.11, pp.1677-1686, 1993.

S. Capkun, L. Buttyan, and J. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE transactions on mobile computing, vol.2, issue.1, pp.52-64, 2003.

P. R. Zimmermann, The official PGP user's guide, 1995.

D. Joshi, K. Namuduri, and R. Pendse, Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis, EURASIP Journal on Wireless Communications and Networking, issue.4, pp.579-589, 2005.

W. Stallings, Cryptography and network security -fourth edition, 2006.

S. Yi and R. Kravets, MOCA: Mobile certificate authority for wireless ad hoc networks, Proceedings of the PKI research workshop (PKI), 2003.

, She has worked at security area for many years, her interest domain is security, wireless network, 2004.

, he was an invited researcher at, Aldri received both his M.Sc. and B.Sc in Informatics from Federal University of, 2001.

, He is currently Professor at the University Pierre et Marie Curie and member of the Scientific Advisory Board of the France Telecom Group, 1975.