A. Ahmed, A. , and M. Younis, « A Survey on Clustering Algorithms for Wireless Sensor Networks, Computer Communications, vol.30, pp.14-15

A. Abuarqoub, F. Al-fayez, T. Alsboui, M. Hammoudeh, and A. Nisbet, « Simulation Issues in Wireless Sensor Networks : A Survey, Proceedings of the 6th International Conference on Sensor Technologies and Applications (SENSORCOMM'12, pp.222-228, 2012.

A. Agah, K. Sajal, and . Das, « Preventing DoS Attacks in Wireless Sensor Networks. A Repeated Game Theory Approach, International Journal of Network Security, vol.5, issue.2, pp.145-153

N. Ahmed, S. Salil, S. Kanhere, and . Jha, The holes problem in wireless sensor networks, ACM SIGMOBILE Mobile Computing and Communications Review, vol.9, issue.2, pp.4-18, 2005.
DOI : 10.1145/1072989.1072992

G. Marco-ajmone-marsan, G. Balbo, S. Conte, G. Donatelli, and . Franceschinis, Modelling with Generalized Stochastic Petri Nets, p.84, 1995.

S. Alam and D. De, Analysis of Security Threats in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.6, issue.2, pp.35-46
DOI : 10.5121/ijwmn.2014.6204

G. Anastasi, M. Conti, M. D. , F. , and A. Passarella, Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, pp.537-568, 2009.
DOI : 10.1016/j.adhoc.2008.06.003

L. Arshadi-et-amir-hossein and . Jahangir, « Entropy Based SYN Flooding Detection, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN'11, pp.139-142, 2011.

P. Ballarini, H. Djafri, M. Duflot, S. Haddad, N. «. Pekergin et al., A Statistical Model Checker for the Hybrid Automata Stochatic Logic, Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11, pp.143-144, 2011.

P. Ballarini, H. Djafri, M. Duflot, S. Haddad, N. «. Pekergin et al., HASL: an Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, pp.306-315, 2011.
DOI : 10.4108/icst.valuetools.2011.245710

URL : https://hal.archives-ouvertes.fr/hal-01113442

P. Ballarini, L. Mokdad, and Q. Monnet, Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks 6.4 (avr. 2013), pp.420-436
DOI : 10.1016/j.comcom.2007.04.008

URL : https://hal.archives-ouvertes.fr/hal-00832082

H. Bawa, P. Singh, and R. Kumar, An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN, International Journal of Computer Network and Information Security, vol.5, issue.1, pp.56-64, 2013.
DOI : 10.5815/ijcnis.2013.01.07

G. Behrmann, A. David, G. Kim, and . Larsen, In : Formal Methods for the Design of Real-Time Systems. T. 3185, pp.200-236, 2004.

A. A. Soufiene-ben-othman, A. Bahattab, H. Trad, and . Youssef, « Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption, Wireless Personal Communications (sept. 2014) (cf, p.28

J. Ben-othman and L. Mokdad, Enhancing data security in ad hoc networks based on multipath routing, Journal of Parallel and Distributed Computing, vol.70, issue.3, pp.309-316
DOI : 10.1016/j.jpdc.2009.02.010

Q. Monnet and L. Mokdad, DoS detection in WSNs, pp.795-840
DOI : 10.1016/B978-0-12-800887-4.00028-6

URL : https://hal.archives-ouvertes.fr/hal-01724085

Q. Monnet, L. Mokdad, and . Ben-othman, Energy-balancing method to detect denial of service attacks in wireless sensor networks, 2014 IEEE International Conference on Communications (ICC)
DOI : 10.1109/ICC.2014.6883303

URL : https://hal.archives-ouvertes.fr/hal-01132739

N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01
DOI : 10.1145/381677.381695

I. Butun, S. D. Morgera, and R. Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.266-282, 2013.
DOI : 10.1109/SURV.2013.050113.00191

M. ?agalj, S. ?apkun, and J. Hubaux, Wormhole-Based Antijamming Techniques in Sensor Networks, Wormhole-Based Anti-Jamming Techniques in Sensor Networks, pp.100-114, 2007.
DOI : 10.1109/TMC.2007.250674

C. Centre, études et d'expertise sur les risqes, l'environnement , la mobilité et l'aménagement. Les transports intelligents. Page consultée le 14 février 2015. url : http://www.transport-intelligent. net/technologies, pp.77-87

K. Chatterjee, M. Randour, and J. Raskin, « Strategy Synthesis for Multi-Dimensional Quantitative Objectives, Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12)
DOI : 10.1007/s00236-013-0182-6

URL : http://www.cassting-project.eu/wp-content/uploads/CRR-acta14.pdf

N. Chawla and A. Jasuja, « Algorithm for Optimizing First Node Die (FND) Time in LEACH Protocol, International Journal of Current Engineering and Technology, vol.4, issue.4, pp.2748-2750, 2014.

Y. Cho, G. Qu, and Y. Wu, Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks, 2012 IEEE Symposium on Security and Privacy Workshops, pp.134-141, 2012.
DOI : 10.1109/SPW.2012.32

P. Closas, A. Pagès-zamora-et-juan, and A. Fernández-rubio, A game theoretical algorithm for joint power and topology control in distributed WSN, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.462-468, 2009.
DOI : 10.1109/ICASSP.2009.4960196

R. Doriguzzi-corin, G. Russello, E. Salvadori, and . Tinykey, TinyKey: A light-weight architecture for Wireless Sensor Networks securing real-world applications, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, pp.68-75, 2011.
DOI : 10.1109/WONS.2011.5720202

G. V. Crosby, N. Pissinou, and J. Gadze, A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, p.62, 2006.
DOI : 10.1109/DSSNS.2006.1

S. Ahmad-yusri-dak, M. Yahya, and . Kassim, « A Literature Survey on Security Challenges in VANETs, International Journal of Computer Theory and Engineering, vol.4, issue.26, pp.1007-1010

H. Deng, W. Li, P. Dharma, and . Agrawal, « Routing Security in Wireless Ad Hoc Networks, IEEE Communications Magazine, vol.4010, pp.70-75, 2002.

A. Diop, Y. Qi, Q. Wang, and S. Hussain, « An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks, International Journal of Computer Science Issues, vol.10, issue.22, pp.490-500, 2013.

K. Drira, H. Seba, H. Kheddouci, and . Ecgk, ECGK: An efficient clustering scheme for group key management in MANETs, Computer Communications, vol.33, issue.9, pp.1094-1107, 2010.
DOI : 10.1016/j.comcom.2010.02.007

URL : https://hal.archives-ouvertes.fr/hal-00454255

N. Farooq, I. Zahoor, and S. Mandal, « Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks, International Journal of Current Engineering and Technology, vol.43, pp.1604-1607, 2014.

M. , C. Fernández-gago, R. Román, and J. Lopez, « A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU'07), Proceedings of the 3rd International Workshop on Security, pp.25-30, 2007.

S. Fouchal, Q. Monnet, D. Mansouri, L. Mokdad, and M. Ioualalen, « A new Clustering Algorithm for Wireless Sensor Networks, Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12, pp.2012-2033

S. Fouchal and I. Lavallée, « Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks
DOI : 10.1145/2069105.2069112

C. Mary, G. , and M. Kumar, « Cluster Based Location Privacy in Wireless Sensor Networks Against a Universal Adversary, Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES'13), pp.288-293, 2013.

A. Ghosal and S. Dasbit, A lightweight security scheme for query processing in clustered wireless sensor networks, Computers and Electrical Engineering (avr. 2014) (cf, p.30
DOI : 10.1016/j.compeleceng.2014.03.014

Z. Gong, S. Nikova, Y. «. Law, and . Klein, KLEIN: A New Family of Lightweight Block Ciphers, Lecture Notes in Computer Science, vol.27, pp.1-18
DOI : 10.1007/978-3-642-25286-0_1

E. Grädel, W. Thomas, and T. Wilke, Automata, Logics, and Infinite Games, p.133, 2002.
DOI : 10.1007/3-540-36387-4

Q. Gu, C. Ferguson, and R. Noorani, A study of self-propagating mal-packets in sensor networks: Attacks and defenses, Computers & Security, vol.30, issue.1, pp.13-27, 2011.
DOI : 10.1016/j.cose.2010.10.002

M. Guechari, L. Mokdad, and S. Tan, Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC)
DOI : 10.1109/ICC.2012.6364158

P. Guo, J. Wang, J. Zhu, Y. Cheng, and J. Kim, Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, International Journal of Security and Its Applications, vol.7, issue.5, pp.225-236
DOI : 10.14257/ijsia.2013.7.5.21

T. Halim and . Md, A Study on the Security Issues in WSN, International Journal of Computer Applications, vol.53, issue.1, pp.26-32
DOI : 10.5120/8386-1992

S. Hamedheidari and R. Rafeh, A novel agent-based approach to detect sinkhole attacks in??wireless sensor networks, Computers and Security 37, pp.1-14
DOI : 10.1016/j.cose.2013.04.002

A. «. Hamieh, La sécurité dans les réseaux sans fil Ad Hoc : les attaques jamming et les noeuds greedy, pp.2012-130

Y. Hammal, Q. Monnet, L. Mokdad, J. Ben-othman, and A. Abdelli, « Timed Automata Based Modeling and Verification of Denial of Service Attacks in Wireless Sensor Networks, Studia Informatica Universalis, vol.121, issue.152, pp.1-46, 2014.

M. J. Handy, M. Haase, and D. Timmerman, Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002.
DOI : 10.1109/MWCN.2002.1045790

URL : http://www.imd.uni-rostock.de/veroeff/MWCN2002.pdf

A. Hegland, E. Winjum, S. F. Mjølsnes, and C. Rong, Øivind Kure et Pål Spilling. « A Survey of Key Management in Ad Hoc Networks, IEEE Communications Surveys, vol.83, issue.33, pp.48-66, 2006.

J. Ho, « Distributed Detection of Node Capture Attacks in Wireless Networks ». In : Smart Wireless Sensor Networks, pp.345-360

. Meng-yen, Y. Hsieh, H. Huang, and . Chao, Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks, Computer Communications, vol.30, pp.2385-2400, 2007.

J. Huang, S. Yang, and C. Dai, An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks, Proceedings of the 3rd International Conference on Electronic Engineering and Computer Science (EECS'13). T. 4. Hong Kong, pp.25-31, 2013.
DOI : 10.1016/j.ieri.2013.11.005

K. Muhammad-hasan-islam, . Nadeem, A. Shoab, and . Khan, « Optimal Sensor Placement for Detection Against Distributed Denial of Service Attacks, Proceedings of the 2009 International Conference on Advanced Computer Control (ICACC'09, pp.675-679, 2009.

N. Jabeura, N. Sahlib-et-ijaz, and M. Khan, Survey on Sensor Holes: A Cause-Effect-Solution Perspective, Proceedings of the 8th International Symposium on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks (IST-AWSN'13). T. 19, pp.1074-1080, 2013.
DOI : 10.1016/j.procs.2013.06.151

R. Jain, The art of Computer Performance Analysis, pp.70-71, 1991.

D. C. Jinwala, R. Dhiren, K. S. Patel, . Das, and . Gupta, « A Survey of the Security Issues in Wireless Sensor Networks, Institute of Technology Journal of Engineering, p.36, 2006.

C. Karlof, N. Sastry, D. Wagner, and . Tinysec, A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp.162-175, 2004.

A. Babu-karuppiah and S. Rajaram, « Energy Efficient Encryption Algorithm for Wireless Sensor Network Whitepaper (cf, International Journal of Engineering Research and Technology, vol.1, issue.3, p.27, 2012.

L. Kazatzopoulos, C. Delakouridis, and C. Anagnostopoulos, « WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination, International Journal of Communication Networks and Information Security, vol.6, issue.2, pp.162-167, 2014.

A. Khan, I. Tamim, and E. Ahmed, Multiple Parameter Based Clustering (MPC): Prospective Analysis for Effective Clustering in Wireless Sensor Network (WSN) Using K-Means Algorithm, Wireless Sensor Network, vol.04, issue.01, pp.18-24, 2012.
DOI : 10.4236/wsn.2012.41003

K. Kifayat, M. Merabti, Q. Shi, and D. , « An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks, Proceedings of the 1st International Conference on Network and Service Security (N2S'09), pp.110-114, 2009.

S. Kumari, M. K. Khan, and M. Atiqzzaman, User authentication schemes for wireless sensor networks: A review, Ad Hoc Networks 27 (avr. 2015), pp.159-194
DOI : 10.1016/j.adhoc.2014.11.018

L. Gu-hsin and C. Chen, « Detecting Denial of Service Attacks in Sensor Networks, Journal of Computers, vol.418, issue.60, pp.58-68, 2008.

Y. Wei-law, J. Doumen, and P. Hartel, Survey and benchmark of block ciphers for wireless sensor networks, ACM Transactions on Sensor Networks, vol.2, issue.1, pp.65-93, 2006.
DOI : 10.1145/1138127.1138130

B. Li and L. Batten, Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of Network and Computer Applications, vol.32, issue.2, pp.337-387, 2009.
DOI : 10.1016/j.jnca.2008.02.017

Z. Li and G. Gong, « A Survey on Security in Wireless Sensor Networks, Special English Edition of Journal of Korean Institute of Information Security, vol.18, issue.6, pp.233-248, 2008.

V. Liu, A. Parks, V. Talla, S. Gollakota, D. Wetherall et al., « Ambient Backscatter : Wireless Communication out of Thin Air, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM. Hong Kong, Chine, août 2013, pp.39-50

J. Luo, P. Papadimitratos, . Jean-pierre-hubaux, and . Gossicrypt, GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.441-450, 2008.
DOI : 10.1109/SAHCN.2008.60

URL : http://arxiv.org/pdf/0808.2591

X. Luo, Y. Zhang, W. Yang, and M. Park, Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks, 2008 Second International Conference on Future Generation Communication and Networking
DOI : 10.1109/FGCN.2008.83

R. Machado and S. Tekinay, « A Survey of Game-Theoric Approaches in Wireless Sensor Networks, Computer Networks 52.16 (nov, pp.3047-3061, 2008.

G. Mahalakshmi and P. Subathra, A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks, Journal of Emerging Technologies in Web Intelligence, vol.6, issue.1, pp.106-110
DOI : 10.4304/jetwi.6.1.106-110

Y. Maleh and A. Ezzati, A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.5, issue.6
DOI : 10.5121/ijwmn.2013.5606

L. Marvin and . Minsky, Computation : Finite and Infinite Machines, p.139, 1967.

S. Misra, P. Venkata-krishna, K. I. Abraham, N. Sasikumar, and S. Fredun, An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010.
DOI : 10.1016/j.camwa.2009.12.035

M. Mohi, A. Movaghar-et-pooya-moradian, and . Zadeh, A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks, 2009 WRI International Conference on Communications and Mobile Computing, p.130, 2009.
DOI : 10.1109/CMC.2009.325

M. Momani and S. Challa, Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19
DOI : 10.5121/ijasuc.2010.1301

J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04
DOI : 10.1145/984622.984660

C. H. Papadimitriou, Computational Complexity, p.146, 1994.

K. Pelechrinis and M. Iliofotou, Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys and Tutorials 13, pp.245-257, 2011.
DOI : 10.1109/SURV.2011.041110.00022

K. Piotrowski, P. Langendoerfer, and S. Peter, How public key cryptography influences wireless sensor node lifetime, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.169-176, 2006.
DOI : 10.1145/1180345.1180366

D. Rakhmatov and S. Vrudhula, An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001.
DOI : 10.1109/ICCAD.2001.968687

V. Rathod and M. Mehta, « Security in Wireless Sensor Network : A Survey, Ganpat University Journal of Engineering and Technology, vol.1, issue.1, pp.35-44, 2011.

B. B. Reddy and K. K. Rao, « A Modified Clustering for LEACH Algorithm in WSN, International Journal of Advanced Computer Science and Applications, vol.45, pp.79-83, 2013.

B. Yenumula and . Reddy, « A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks, Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM'09, pp.462-468, 2009.

M. R. Mohammad-reza-rohbanian, A. Kharazmi, M. Keshavarz-haddad, and . Keshtgary, « Watchdog-LEACH : A New Method Based on LEACH Protocol to Secure Clustered Wireless Sensor Networks, Advances in Computer Science : An International Journal 2.3 (juil. 2013), pp.105-117

W. Sammouri, É. Côme, L. Oukhellou, and P. Aknin, « Mining Floating Train Data Sequences for Temporal Association Rules within a Predictive Maintenance Framework Advances in Data Mining. Applications and Theoretical Aspects. Sous la dir. de Petra Perner. T. 7987. Lecture Notes in Computer Science, pp.112-126

K. Ho-seok, K. Sung-ryula, and K. Pankoo, « Traffic Deflection Method for DoS Attack Defense using a Location-Based Routing Protocol in the Sensor Network, Computer Science and Information Systems, vol.10, issue.2, pp.685-701, 2013.

H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, Detection and mitigation of sinkhole attacks in wireless sensor networks, Journal of Computer and System Sciences, vol.80, issue.3, pp.644-653, 2014.
DOI : 10.1016/j.jcss.2013.06.016

V. Shah and S. Sharma, « A Review of Existing Security Frameworks and Encryption Methods for Wireless Sensor Networks, International Journal of Innovations & Advancement in Computer Science, vol.3, issue.33, pp.90-98

V. Shah and S. Sharma, Evaluation of Encryption Method of SNEP for Implementing Security in Wireless Sensor Network using SPINS Framework, International Journal of Grid and Distributed Computing, vol.7, issue.5, pp.43-52, 2014.
DOI : 10.14257/ijgdc.2014.7.5.04

A. «. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613
DOI : 10.1145/359168.359176

M. Shao, S. Zhu, W. Zhang, G. Cao, and Y. Yang, pDCS: Security and Privacy Support for Data-Centric Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1023-1038, 2009.
DOI : 10.1109/INFCOM.2007.154

S. Sharma and J. Sanjay-kumar, A survey on secure hierarchical routing protocols in wireless sensor networks, Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS '11
DOI : 10.1145/1947940.1947972

H. Shi, W. Wang, N. Kwok, and S. Chen, Game Theory for Wireless Sensor Networks: A Survey, Sensors 12.7 (juil. 2012), pp.9055-9097
DOI : 10.1016/j.pmcj.2005.12.001

M. P. Shio-kumar-singh, D. K. Singh, and . Singh, « A Survey on Network Security and Attack Defense Mechanism for Wireless Sensor Networks, International Journal of Computer Trends and Technology, p.45, 2011.

P. Sivakumar, K. Amirthavalli, and M. Senthil, Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach, International Journal of Distributed Sensor Networks, vol.1, issue.9, p.17, 2014.
DOI : 10.1080/15501320902876055

J. Son, H. Luo, and S. Seo, Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010.
DOI : 10.1016/j.comcom.2010.03.027

E. Stavrou and A. Pitsillides, A survey on secure multipath routing protocols in WSNs, Computer Networks 54.13 (sept. 2010), pp.2215-2238
DOI : 10.1016/j.comnet.2010.02.015

F. Sun, Z. Zhao, Z. Fang, L. Du, Z. Xu et al., A Review of Attacks and Security Protocols for Wireless Sensor Networks, Journal of Networks, vol.9, issue.5, pp.1103-1113, 2014.
DOI : 10.4304/jnw.9.5.1103-1113

S. Andrew, D. J. Tanenbaum, and . Wetherall, Computer Networks, pp.11-14

F. Theoleyre, F. «. Valois, and . Vsr, A Routing Protocol Based on a Structure of Self-Organization, Studia Informatica Universalis, vol.61, issue.22, pp.40-69, 2008.

L. Tobarra, D. Cazorla, F. Cuartero, G. Díaz, and E. Cambronero, Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK, Telecommunication Systems, vol.8, issue.5, pp.3-4, 2009.
DOI : 10.3233/JCS-1998-61-204

A. Varshovi and B. Sadeghiyan, « Ontological Classification of Network Denial of Service Attacks : Basis for a Unified Detection Framework, Scientia Iranica, vol.17, issue.2, pp.133-148

Y. Velner, K. Chatterjee, L. Doyen, T. A. Henzinger, A. Rabinovich et al., The complexity of multi-mean-payoff and multi-energy games, CoRR abs, p.131, 1209.
DOI : 10.1016/j.ic.2015.03.001

D. Anthony, J. A. Wood, and . Stankovic, « A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, Handbook of Sensor Networks : Compact Wireless and Wired Sensing Systems. Sous la dir. de Mohammad Ilyas et Imad Mahgoub, p.44, 2004.

K. Wu, D. Dreef, B. Sun, and Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007.
DOI : 10.1016/j.adhoc.2006.05.009

Y. Xiao, B. Venkata-krishna-rayi, X. Sun, F. Du, M. Hu et al., A survey of key management schemes in wireless sensor networks, Computer Communications, vol.30, issue.11-12, pp.11-12, 2007.
DOI : 10.1016/j.comcom.2007.04.009

B. Yahya and . Ben-othman, Towards a classification of energy aware MAC protocols for wireless sensor networks, Wireless Communications and Mobile Computing 9, pp.1572-1607, 2009.
DOI : 10.1109/2.869369

W. Ye, J. Heidemann, and D. Estrin, « An Energy-Efficient MAC Protocol for Wireless Sensor Networks, Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFO- COM'02). T. 3, pp.1567-1576, 2002.

O. Younis and S. Fahmy, HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379
DOI : 10.1109/TMC.2004.41

URL : http://people.cs.vt.edu/~irchen/6204/paper/HEED-tmc04.pdf

T. Zahariadis, P. Trakadas, and H. C. Leligou, Sotiris Maniatis et Panagiotis Karkazis. « A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks, Wireless Personal Communications 69.2 (mar. 2013), pp.805-826

M. El-zaher, J. Contet, P. Gruer, F. Gechter, and A. Koukam, « Compositional Verification for Reactive Multi-Agent Systems applied to Platoon Non Collision Verification, Studia Informatica Universalis, vol.103, issue.23, pp.119-141, 2012.

Y. Zhu and W. Wu, Jian Pan et Yi-Ping Tang. « An Energy-Efficient Data Gathering Algorithm to Prolong Lifetime of Wireless Sensor Networks, Computer Communications, vol.335, issue.22, pp.639-647

S. Zhu, S. Setia, and S. Jajodia, « LEAP : Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CSS'03)

S. Zhu, S. Setia, S. «. Jajodia, and . Leap+, LEAP+, ACM Transactions on Sensor Networks, vol.2, issue.4, pp.500-528, 2006.
DOI : 10.1145/1218556.1218559

Z. Alliance, ZigBee Specification, p.32, 2008.

U. Zwick and M. Paterson, The complexity of mean payoff games on graphs, Theoretical Computer Science, vol.158, issue.1-2, pp.1-2, 1996.
DOI : 10.1016/0304-3975(95)00188-3