« A Survey on Clustering Algorithms for Wireless Sensor Networks, Computer Communications, vol.30, pp.14-15 ,
« Simulation Issues in Wireless Sensor Networks : A Survey, Proceedings of the 6th International Conference on Sensor Technologies and Applications (SENSORCOMM'12, pp.222-228, 2012. ,
« Preventing DoS Attacks in Wireless Sensor Networks. A Repeated Game Theory Approach, International Journal of Network Security, vol.5, issue.2, pp.145-153 ,
The holes problem in wireless sensor networks, ACM SIGMOBILE Mobile Computing and Communications Review, vol.9, issue.2, pp.4-18, 2005. ,
DOI : 10.1145/1072989.1072992
Modelling with Generalized Stochastic Petri Nets, p.84, 1995. ,
Analysis of Security Threats in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.6, issue.2, pp.35-46 ,
DOI : 10.5121/ijwmn.2014.6204
Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, pp.537-568, 2009. ,
DOI : 10.1016/j.adhoc.2008.06.003
« Entropy Based SYN Flooding Detection, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN'11, pp.139-142, 2011. ,
A Statistical Model Checker for the Hybrid Automata Stochatic Logic, Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11, pp.143-144, 2011. ,
HASL: an Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, pp.306-315, 2011. ,
DOI : 10.4108/icst.valuetools.2011.245710
URL : https://hal.archives-ouvertes.fr/hal-01113442
Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks 6.4 (avr. 2013), pp.420-436 ,
DOI : 10.1016/j.comcom.2007.04.008
URL : https://hal.archives-ouvertes.fr/hal-00832082
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN, International Journal of Computer Network and Information Security, vol.5, issue.1, pp.56-64, 2013. ,
DOI : 10.5815/ijcnis.2013.01.07
In : Formal Methods for the Design of Real-Time Systems. T. 3185, pp.200-236, 2004. ,
« Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption, Wireless Personal Communications (sept. 2014) (cf, p.28 ,
Enhancing data security in ad hoc networks based on multipath routing, Journal of Parallel and Distributed Computing, vol.70, issue.3, pp.309-316 ,
DOI : 10.1016/j.jpdc.2009.02.010
DoS detection in WSNs, pp.795-840 ,
DOI : 10.1016/B978-0-12-800887-4.00028-6
URL : https://hal.archives-ouvertes.fr/hal-01724085
Energy-balancing method to detect denial of service attacks in wireless sensor networks, 2014 IEEE International Conference on Communications (ICC) ,
DOI : 10.1109/ICC.2014.6883303
URL : https://hal.archives-ouvertes.fr/hal-01132739
Intercepting mobile communications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01 ,
DOI : 10.1145/381677.381695
A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.266-282, 2013. ,
DOI : 10.1109/SURV.2013.050113.00191
Wormhole-Based Antijamming Techniques in Sensor Networks, Wormhole-Based Anti-Jamming Techniques in Sensor Networks, pp.100-114, 2007. ,
DOI : 10.1109/TMC.2007.250674
études et d'expertise sur les risqes, l'environnement , la mobilité et l'aménagement. Les transports intelligents. Page consultée le 14 février 2015. url : http://www.transport-intelligent. net/technologies, pp.77-87 ,
« Strategy Synthesis for Multi-Dimensional Quantitative Objectives, Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12) ,
DOI : 10.1007/s00236-013-0182-6
URL : http://www.cassting-project.eu/wp-content/uploads/CRR-acta14.pdf
« Algorithm for Optimizing First Node Die (FND) Time in LEACH Protocol, International Journal of Current Engineering and Technology, vol.4, issue.4, pp.2748-2750, 2014. ,
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks, 2012 IEEE Symposium on Security and Privacy Workshops, pp.134-141, 2012. ,
DOI : 10.1109/SPW.2012.32
A game theoretical algorithm for joint power and topology control in distributed WSN, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.462-468, 2009. ,
DOI : 10.1109/ICASSP.2009.4960196
TinyKey: A light-weight architecture for Wireless Sensor Networks securing real-world applications, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, pp.68-75, 2011. ,
DOI : 10.1109/WONS.2011.5720202
A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, p.62, 2006. ,
DOI : 10.1109/DSSNS.2006.1
« A Literature Survey on Security Challenges in VANETs, International Journal of Computer Theory and Engineering, vol.4, issue.26, pp.1007-1010 ,
« Routing Security in Wireless Ad Hoc Networks, IEEE Communications Magazine, vol.4010, pp.70-75, 2002. ,
« An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks, International Journal of Computer Science Issues, vol.10, issue.22, pp.490-500, 2013. ,
ECGK: An efficient clustering scheme for group key management in MANETs, Computer Communications, vol.33, issue.9, pp.1094-1107, 2010. ,
DOI : 10.1016/j.comcom.2010.02.007
URL : https://hal.archives-ouvertes.fr/hal-00454255
« Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks, International Journal of Current Engineering and Technology, vol.43, pp.1604-1607, 2014. ,
« A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU'07), Proceedings of the 3rd International Workshop on Security, pp.25-30, 2007. ,
« A new Clustering Algorithm for Wireless Sensor Networks, Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12, pp.2012-2033 ,
« Fast and Flexible Unsupervised Clustering Algorithm Based on Ultrametric Properties, Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks ,
DOI : 10.1145/2069105.2069112
« Cluster Based Location Privacy in Wireless Sensor Networks Against a Universal Adversary, Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES'13), pp.288-293, 2013. ,
A lightweight security scheme for query processing in clustered wireless sensor networks, Computers and Electrical Engineering (avr. 2014) (cf, p.30 ,
DOI : 10.1016/j.compeleceng.2014.03.014
KLEIN: A New Family of Lightweight Block Ciphers, Lecture Notes in Computer Science, vol.27, pp.1-18 ,
DOI : 10.1007/978-3-642-25286-0_1
Automata, Logics, and Infinite Games, p.133, 2002. ,
DOI : 10.1007/3-540-36387-4
A study of self-propagating mal-packets in sensor networks: Attacks and defenses, Computers & Security, vol.30, issue.1, pp.13-27, 2011. ,
DOI : 10.1016/j.cose.2010.10.002
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC) ,
DOI : 10.1109/ICC.2012.6364158
Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, International Journal of Security and Its Applications, vol.7, issue.5, pp.225-236 ,
DOI : 10.14257/ijsia.2013.7.5.21
A Study on the Security Issues in WSN, International Journal of Computer Applications, vol.53, issue.1, pp.26-32 ,
DOI : 10.5120/8386-1992
A novel agent-based approach to detect sinkhole attacks in??wireless sensor networks, Computers and Security 37, pp.1-14 ,
DOI : 10.1016/j.cose.2013.04.002
La sécurité dans les réseaux sans fil Ad Hoc : les attaques jamming et les noeuds greedy, pp.2012-130 ,
« Timed Automata Based Modeling and Verification of Denial of Service Attacks in Wireless Sensor Networks, Studia Informatica Universalis, vol.121, issue.152, pp.1-46, 2014. ,
Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002. ,
DOI : 10.1109/MWCN.2002.1045790
URL : http://www.imd.uni-rostock.de/veroeff/MWCN2002.pdf
Øivind Kure et Pål Spilling. « A Survey of Key Management in Ad Hoc Networks, IEEE Communications Surveys, vol.83, issue.33, pp.48-66, 2006. ,
« Distributed Detection of Node Capture Attacks in Wireless Networks ». In : Smart Wireless Sensor Networks, pp.345-360 ,
Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks, Computer Communications, vol.30, pp.2385-2400, 2007. ,
An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks, Proceedings of the 3rd International Conference on Electronic Engineering and Computer Science (EECS'13). T. 4. Hong Kong, pp.25-31, 2013. ,
DOI : 10.1016/j.ieri.2013.11.005
« Optimal Sensor Placement for Detection Against Distributed Denial of Service Attacks, Proceedings of the 2009 International Conference on Advanced Computer Control (ICACC'09, pp.675-679, 2009. ,
Survey on Sensor Holes: A Cause-Effect-Solution Perspective, Proceedings of the 8th International Symposium on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks (IST-AWSN'13). T. 19, pp.1074-1080, 2013. ,
DOI : 10.1016/j.procs.2013.06.151
The art of Computer Performance Analysis, pp.70-71, 1991. ,
« A Survey of the Security Issues in Wireless Sensor Networks, Institute of Technology Journal of Engineering, p.36, 2006. ,
A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp.162-175, 2004. ,
« Energy Efficient Encryption Algorithm for Wireless Sensor Network Whitepaper (cf, International Journal of Engineering Research and Technology, vol.1, issue.3, p.27, 2012. ,
« WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination, International Journal of Communication Networks and Information Security, vol.6, issue.2, pp.162-167, 2014. ,
Multiple Parameter Based Clustering (MPC): Prospective Analysis for Effective Clustering in Wireless Sensor Network (WSN) Using K-Means Algorithm, Wireless Sensor Network, vol.04, issue.01, pp.18-24, 2012. ,
DOI : 10.4236/wsn.2012.41003
« An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks, Proceedings of the 1st International Conference on Network and Service Security (N2S'09), pp.110-114, 2009. ,
User authentication schemes for wireless sensor networks: A review, Ad Hoc Networks 27 (avr. 2015), pp.159-194 ,
DOI : 10.1016/j.adhoc.2014.11.018
« Detecting Denial of Service Attacks in Sensor Networks, Journal of Computers, vol.418, issue.60, pp.58-68, 2008. ,
Survey and benchmark of block ciphers for wireless sensor networks, ACM Transactions on Sensor Networks, vol.2, issue.1, pp.65-93, 2006. ,
DOI : 10.1145/1138127.1138130
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of Network and Computer Applications, vol.32, issue.2, pp.337-387, 2009. ,
DOI : 10.1016/j.jnca.2008.02.017
« A Survey on Security in Wireless Sensor Networks, Special English Edition of Journal of Korean Institute of Information Security, vol.18, issue.6, pp.233-248, 2008. ,
« Ambient Backscatter : Wireless Communication out of Thin Air, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM. Hong Kong, Chine, août 2013, pp.39-50 ,
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.441-450, 2008. ,
DOI : 10.1109/SAHCN.2008.60
URL : http://arxiv.org/pdf/0808.2591
Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks, 2008 Second International Conference on Future Generation Communication and Networking ,
DOI : 10.1109/FGCN.2008.83
« A Survey of Game-Theoric Approaches in Wireless Sensor Networks, Computer Networks 52.16 (nov, pp.3047-3061, 2008. ,
A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks, Journal of Emerging Technologies in Web Intelligence, vol.6, issue.1, pp.106-110 ,
DOI : 10.4304/jetwi.6.1.106-110
A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network, International Journal of Wireless & Mobile Networks, vol.5, issue.6 ,
DOI : 10.5121/ijwmn.2013.5606
Computation : Finite and Infinite Machines, p.139, 1967. ,
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010. ,
DOI : 10.1016/j.camwa.2009.12.035
A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks, 2009 WRI International Conference on Communications and Mobile Computing, p.130, 2009. ,
DOI : 10.1109/CMC.2009.325
Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19 ,
DOI : 10.5121/ijasuc.2010.1301
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04 ,
DOI : 10.1145/984622.984660
Computational Complexity, p.146, 1994. ,
Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys and Tutorials 13, pp.245-257, 2011. ,
DOI : 10.1109/SURV.2011.041110.00022
How public key cryptography influences wireless sensor node lifetime, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.169-176, 2006. ,
DOI : 10.1145/1180345.1180366
An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001. ,
DOI : 10.1109/ICCAD.2001.968687
« Security in Wireless Sensor Network : A Survey, Ganpat University Journal of Engineering and Technology, vol.1, issue.1, pp.35-44, 2011. ,
« A Modified Clustering for LEACH Algorithm in WSN, International Journal of Advanced Computer Science and Applications, vol.45, pp.79-83, 2013. ,
« A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks, Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM'09, pp.462-468, 2009. ,
« Watchdog-LEACH : A New Method Based on LEACH Protocol to Secure Clustered Wireless Sensor Networks, Advances in Computer Science : An International Journal 2.3 (juil. 2013), pp.105-117 ,
« Mining Floating Train Data Sequences for Temporal Association Rules within a Predictive Maintenance Framework Advances in Data Mining. Applications and Theoretical Aspects. Sous la dir. de Petra Perner. T. 7987. Lecture Notes in Computer Science, pp.112-126 ,
« Traffic Deflection Method for DoS Attack Defense using a Location-Based Routing Protocol in the Sensor Network, Computer Science and Information Systems, vol.10, issue.2, pp.685-701, 2013. ,
Detection and mitigation of sinkhole attacks in wireless sensor networks, Journal of Computer and System Sciences, vol.80, issue.3, pp.644-653, 2014. ,
DOI : 10.1016/j.jcss.2013.06.016
« A Review of Existing Security Frameworks and Encryption Methods for Wireless Sensor Networks, International Journal of Innovations & Advancement in Computer Science, vol.3, issue.33, pp.90-98 ,
Evaluation of Encryption Method of SNEP for Implementing Security in Wireless Sensor Network using SPINS Framework, International Journal of Grid and Distributed Computing, vol.7, issue.5, pp.43-52, 2014. ,
DOI : 10.14257/ijgdc.2014.7.5.04
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613 ,
DOI : 10.1145/359168.359176
pDCS: Security and Privacy Support for Data-Centric Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1023-1038, 2009. ,
DOI : 10.1109/INFCOM.2007.154
A survey on secure hierarchical routing protocols in wireless sensor networks, Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS '11 ,
DOI : 10.1145/1947940.1947972
Game Theory for Wireless Sensor Networks: A Survey, Sensors 12.7 (juil. 2012), pp.9055-9097 ,
DOI : 10.1016/j.pmcj.2005.12.001
« A Survey on Network Security and Attack Defense Mechanism for Wireless Sensor Networks, International Journal of Computer Trends and Technology, p.45, 2011. ,
Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach, International Journal of Distributed Sensor Networks, vol.1, issue.9, p.17, 2014. ,
DOI : 10.1080/15501320902876055
Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010. ,
DOI : 10.1016/j.comcom.2010.03.027
A survey on secure multipath routing protocols in WSNs, Computer Networks 54.13 (sept. 2010), pp.2215-2238 ,
DOI : 10.1016/j.comnet.2010.02.015
A Review of Attacks and Security Protocols for Wireless Sensor Networks, Journal of Networks, vol.9, issue.5, pp.1103-1113, 2014. ,
DOI : 10.4304/jnw.9.5.1103-1113
Computer Networks, pp.11-14 ,
A Routing Protocol Based on a Structure of Self-Organization, Studia Informatica Universalis, vol.61, issue.22, pp.40-69, 2008. ,
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK, Telecommunication Systems, vol.8, issue.5, pp.3-4, 2009. ,
DOI : 10.3233/JCS-1998-61-204
« Ontological Classification of Network Denial of Service Attacks : Basis for a Unified Detection Framework, Scientia Iranica, vol.17, issue.2, pp.133-148 ,
The complexity of multi-mean-payoff and multi-energy games, CoRR abs, p.131, 1209. ,
DOI : 10.1016/j.ic.2015.03.001
« A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, Handbook of Sensor Networks : Compact Wireless and Wired Sensing Systems. Sous la dir. de Mohammad Ilyas et Imad Mahgoub, p.44, 2004. ,
Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007. ,
DOI : 10.1016/j.adhoc.2006.05.009
A survey of key management schemes in wireless sensor networks, Computer Communications, vol.30, issue.11-12, pp.11-12, 2007. ,
DOI : 10.1016/j.comcom.2007.04.009
Towards a classification of energy aware MAC protocols for wireless sensor networks, Wireless Communications and Mobile Computing 9, pp.1572-1607, 2009. ,
DOI : 10.1109/2.869369
« An Energy-Efficient MAC Protocol for Wireless Sensor Networks, Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFO- COM'02). T. 3, pp.1567-1576, 2002. ,
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379 ,
DOI : 10.1109/TMC.2004.41
URL : http://people.cs.vt.edu/~irchen/6204/paper/HEED-tmc04.pdf
Sotiris Maniatis et Panagiotis Karkazis. « A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks, Wireless Personal Communications 69.2 (mar. 2013), pp.805-826 ,
« Compositional Verification for Reactive Multi-Agent Systems applied to Platoon Non Collision Verification, Studia Informatica Universalis, vol.103, issue.23, pp.119-141, 2012. ,
Jian Pan et Yi-Ping Tang. « An Energy-Efficient Data Gathering Algorithm to Prolong Lifetime of Wireless Sensor Networks, Computer Communications, vol.335, issue.22, pp.639-647 ,
« LEAP : Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CSS'03) ,
LEAP+, ACM Transactions on Sensor Networks, vol.2, issue.4, pp.500-528, 2006. ,
DOI : 10.1145/1218556.1218559
ZigBee Specification, p.32, 2008. ,
The complexity of mean payoff games on graphs, Theoretical Computer Science, vol.158, issue.1-2, pp.1-2, 1996. ,
DOI : 10.1016/0304-3975(95)00188-3