A robust reputation system for mobile ad-hoc, 2003. ,
Secure positioning in wireless networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.221-232, 2006. ,
DOI : 10.1109/JSAC.2005.861380
The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996. ,
DOI : 10.1145/234533.234549
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
DOI : 10.1145/226643.226647
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.498
Sybilproof reputation mechanisms, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.128-132, 2005. ,
DOI : 10.1145/1080192.1080202
Deterministic secure positioning in wireless sensor networks, the ACM/IEEE International Conference on Distributed Computing in Sensor Networks (DCOSS), to appear, 2008. ,
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.564-570, 2006. ,
DOI : 10.1109/WOWMOM.2006.27
Security support for in-network processing in Wireless Sensor Networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.83-93, 2003. ,
DOI : 10.1145/986858.986870
The Sybil Attack, International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Detecting Phantom Nodes in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2391-2395, 2007. ,
DOI : 10.1109/INFCOM.2007.287
Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols, 2003. ,
Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, pp.293-315, 2003. ,
Validating and Securing Spontaneous Associations between Wireless Devices, ISW: International Workshop on Information Security, pp.44-53, 2003. ,
DOI : 10.1007/10958513_4
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
Rope: robust position estimation in wireless sensor networks, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., pp.324-331, 2005. ,
DOI : 10.1109/IPSN.2005.1440942
Self-certified Sybil-free pseudonyms, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.154-159, 2008. ,
DOI : 10.1145/1352533.1352558
Discovering Network Topology in the Presence of Byzantine Faults, 13th International Colloquium on Structural Information and Communication Complexity SIROCCO, pp.212-226, 2006. ,
DOI : 10.1007/11780823_17
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004. ,
DOI : 10.1145/984622.984660
Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.49-63, 2005. ,
DOI : 10.1109/SP.2005.8
Wireless communications -Principles and Practice, 2002. ,
Secure verification of location claims, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.1-10, 2003. ,
DOI : 10.1145/941311.941313
Designing secure sensor networks, IEEE Wireless Communications, vol.11, issue.6, 2004. ,
On trust models and trust evaluation metrics for ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.318-328, 2006. ,
DOI : 10.1109/JSAC.2005.861390
Secure location verification using radio broadcast, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.4, pp.369-383, 2006. ,
DOI : 10.1109/tdsc.2006.57
Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002. ,
DOI : 10.1109/MC.2002.1039518
Toward resilient security in wireless sensor networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.34-45, 2005. ,
DOI : 10.1145/1062689.1062696
Defending against sybil attacks in sensor networks, Second International Workshop on Security in Distributed Computing Systems, pp.185-191, 2005. ,
Impact of radio irregularity on wireless sensor networks, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.125-138, 2004. ,
DOI : 10.1145/990064.990081
LEAP -efficient security mechanisms for large-scale distributed sensor networks, Proceedings of the 1st International Conference on Embedded Networked Sensor Systems SenSys, pp.308-309, 2003. ,
Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt, Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche INRIA Sophia Antipolis : 2004, route des Lucioles -BP 93 -06902 Sophia Antipolis Cedex ,