GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.441-450, 2008. ,
DOI : 10.1109/SAHCN.2008.60
Data protection in multipath WSNs, 2013 IEEE Symposium on Computers and Communications (ISCC), 2013. ,
DOI : 10.1109/ISCC.2013.6754926
URL : https://hal.archives-ouvertes.fr/hal-01132734
Enhancing data security in ad hoc networks based on multipath routing, Journal of Parallel and Distributed Computing, vol.70, issue.3, pp.309-316, 2010. ,
DOI : 10.1016/j.jpdc.2009.02.010
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.454-461, 2011. ,
DOI : 10.1109/LCN.2011.6115506
Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007. ,
DOI : 10.1016/j.adhoc.2006.05.009
Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009. ,
DOI : 10.1016/j.comnet.2009.02.023
A survey on network security and attack defense mechanism for wireless sensor 44 ,
Security in wireless sensor network: a survey, Ganpat University Journal of Engineering and Technology, vol.1, issue.1, pp.35-44, 2011. ,
Routing security in wireless ad hoc networks, IEEE Communications Magazine, vol.40, issue.10, pp.70-75, 2002. ,
DOI : 10.1109/MCOM.2002.1039859
Sinkhole intrusion indicators in DSR MANETs, Proceedings of the first International on Broadband Networks BroadNets'04), pp.681-688, 2004. ,
Distributed Detection of Node Capture Attacks in Wireless Sensor Networks, Smart Wireless Sensor Networks, pp.345-360, 2010. ,
DOI : 10.5772/13084
A novel agent-based approach to detect sinkhole attacks in??wireless sensor networks, Computers & Security, vol.37, pp.1-14, 2013. ,
DOI : 10.1016/j.cose.2013.04.002
Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010. ,
DOI : 10.5121/ijasuc.2010.1301
A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the third international workshop on Security, Privacy and trust in Pervasive and Ubiquitous computing (SECPerU'07), pp.25-30, 2007. ,
Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks, Advances in Computer Science: an International Journal, vol.2, issue.3, pp.105-117, 2013. ,
Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008. ,
Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002. ,
DOI : 10.1109/MWCN.2002.1045790
VSR: a routing protocol based on a structure of self-organization, Studia Informatica Universalis, vol.6, issue.1, pp.27-57, 2008. ,
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364158
Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013. ,
DOI : 10.1002/sec.630
URL : https://hal.archives-ouvertes.fr/hal-00832082
VSR: a routing protocol based on a structure of self-organization, Studia Informatica Universalis, vol.10, issue.3, pp.119-141, 2012. ,
HASL: an Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, pp.306-315, 2011. ,
DOI : 10.4108/icst.valuetools.2011.245710
URL : https://hal.archives-ouvertes.fr/hal-01113442
COSMOS: A Statistical Model Checker for the Hybrid Automata Stochastic Logic, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.143-144, 2011. ,
DOI : 10.1109/QEST.2011.24
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK, Telecommunication Systems, vol.8, issue.5, pp.3-491, 2009. ,
DOI : 10.1007/s11235-008-9131-z
Security of wireless sensor network, 2009. ,
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004. ,
DOI : 10.1109/TMC.2004.41
A Tutorial on Uppaal, Formal Methods for the Design of Real-Time Systems, pp.200-236, 2004. ,
DOI : 10.1007/978-3-540-30080-9_7
A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994. ,
DOI : 10.1016/0304-3975(94)90010-8
Model-checking for real time systems, Proceedings of the fifth Symposium on Logic In Computer Science (LICS'90), pp.414-425, 1990. ,
Symbolic model checking for real-time systems, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science, pp.193-244, 1994. ,
DOI : 10.1109/LICS.1992.185551
Software Model Checking, NATO Summer School, IOS Press Computer and System Sciences, vol.180, pp.309-355, 2000. ,
DOI : 10.1007/978-0-387-35578-8_28
An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001. ,
DOI : 10.1109/ICCAD.2001.968687