I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002.
DOI : 10.1016/S1389-1286(01)00302-4

G. J. Pottie and W. J. Kaiser, Wireless integrated network sensors, Communications of the ACM, vol.43, issue.5, pp.51-58, 2000.
DOI : 10.1145/332833.332838

E. Mykletun, G. Tsudik, and C. Castelluccia, Efficient aggregation of encrypted data in wireless sensor networks, MobiQuitous 2005 : Conference on Mobile and Ubiquitous Systems : Networking and Services, pp.109-117, 2005.

B. Przydatek, D. Song, and A. Perrig, SIA, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.255-265, 2003.
DOI : 10.1145/958491.958521

L. Hu and D. Evans, Secure aggregation for wireless networks, SAINT-W '03 : Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), p.384, 2003.

D. Wagner, Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.78-87, 2004.
DOI : 10.1145/1029102.1029116

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, Journal of the ACM, vol.36, issue.2, pp.335-348, 1989.
DOI : 10.1145/62044.62050

C. Karlof, N. Sastry, and D. Wagner, TinySec, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004.
DOI : 10.1145/1031495.1031515

W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A pairwise key predistribution scheme for wireless sensor networks, CCS '03 : Proceedings of the 10th ACM conference on Computer and communications security, pp.42-51, 2003.
DOI : 10.1145/1065545.1065548

D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-resilient, energy-efficient multipath routing in wireless sensor networks, MobiHoc '01 : Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp.251-254, 2001.

S. Dulman, T. Nieberg, J. Wu, and P. Havinga, Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003., 2003.
DOI : 10.1109/WCNC.2003.1200680

C. Karlof and D. Wagner, Secure routing in wireless sensor networks : Attacks and countermeasures, Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol.1, pp.2-3, 2003.

. Micaz-data-sheet and . Crossbow, Available : http://www.xbow. com/Products/Product pdf files

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004.
DOI : 10.1145/990680.990707

D. P. Ning and A. Liu, TinyECC : Elliptic curve cryptography for sensor networks, 2005.

R. Laboratories, RSAREF : A free cryptographic toolkit, 1994.