J. Luo, P. Papadimitratos, and J. Hubaux, GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.441-450, 2008.
DOI : 10.1109/SAHCN.2008.60

Q. Monnet, L. Mokdad, and J. Ben-othman, Data protection in multipath WSNs, 2013 IEEE Symposium on Computers and Communications (ISCC), 2013.
DOI : 10.1109/ISCC.2013.6754926

URL : https://hal.archives-ouvertes.fr/hal-01132734

J. Ben-othman and L. Mokdad, Enhancing data security in ad hoc networks based on multipath routing, Journal of Parallel and Distributed Computing, vol.70, issue.3, pp.309-316, 2010.
DOI : 10.1016/j.jpdc.2009.02.010

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

M. A. Simplicio, B. T. Jr, P. S. De-oliveira, C. B. Barreto, . Margi et al., Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks, 2011 IEEE 36th Conference on Local Computer Networks, pp.454-461, 2011.
DOI : 10.1109/LCN.2011.6115506

K. Wu, D. Dreef, B. Sun, and Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007.
DOI : 10.1016/j.adhoc.2006.05.009

S. Ozdemir and Y. Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009.
DOI : 10.1016/j.comnet.2009.02.023

M. P. Shio-kumar-singh, D. K. Singh, and . Singh, A survey on network security and attack defense mechanism for wireless sensor 44

V. Rathod and M. Mehta, Security in wireless sensor network: a survey, Ganpat University Journal of Engineering and Technology, vol.1, issue.1, pp.35-44, 2011.

H. Deng, W. Li, and D. P. Agrawal, Routing security in wireless ad hoc networks, IEEE Communications Magazine, vol.40, issue.10, pp.70-75, 2002.
DOI : 10.1109/MCOM.2002.1039859

J. Benjamin, H. C. Culpepper, and . Tseng, Sinkhole intrusion indicators in DSR MANETs, Proceedings of the first International on Broadband Networks BroadNets'04), pp.681-688, 2004.

J. Ho, Distributed Detection of Node Capture Attacks in Wireless Sensor Networks, Smart Wireless Sensor Networks, pp.345-360, 2010.
DOI : 10.5772/13084

S. Hamedheidari and R. Rafeh, A novel agent-based approach to detect sinkhole attacks in??wireless sensor networks, Computers & Security, vol.37, pp.1-14, 2013.
DOI : 10.1016/j.cose.2013.04.002

M. Momani and S. Challa, Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010.
DOI : 10.5121/ijasuc.2010.1301

M. , C. Fernández-gago, R. Román, and J. Lopez, A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the third international workshop on Security, Privacy and trust in Pervasive and Ubiquitous computing (SECPerU'07), pp.25-30, 2007.

M. R. Mohammad-reza-rohbanian, A. Kharazmi, M. Keshavarz-haddad, and . Keshtgary, Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks, Advances in Computer Science: an International Journal, vol.2, issue.3, pp.105-117, 2013.

L. Gu-hsin and C. Chen, Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008.

M. J. Handy, M. Haase, and D. Timmerman, Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002.
DOI : 10.1109/MWCN.2002.1045790

F. Theoleyre and F. Valois, VSR: a routing protocol based on a structure of self-organization, Studia Informatica Universalis, vol.6, issue.1, pp.27-57, 2008.

M. Guechari, L. Mokdad, and S. Tan, Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364158

P. Ballarini, L. Mokdad, and Q. Monnet, Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013.
DOI : 10.1002/sec.630

URL : https://hal.archives-ouvertes.fr/hal-00832082

M. El-zaher, J. Contet, P. Gruer, F. Gechter, and A. Koukam, VSR: a routing protocol based on a structure of self-organization, Studia Informatica Universalis, vol.10, issue.3, pp.119-141, 2012.

P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin, HASL: an Expressive Language for Statistical Verification of Stochastic Models, Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, pp.306-315, 2011.
DOI : 10.4108/icst.valuetools.2011.245710

URL : https://hal.archives-ouvertes.fr/hal-01113442

P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin, COSMOS: A Statistical Model Checker for the Hybrid Automata Stochastic Logic, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.143-144, 2011.
DOI : 10.1109/QEST.2011.24

L. Tobarra, D. Cazorla, F. Cuartero, G. Díaz, and E. Cambronero, Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK, Telecommunication Systems, vol.8, issue.5, pp.3-491, 2009.
DOI : 10.1007/s11235-008-9131-z

J. Rehana, Security of wireless sensor network, 2009.

O. Younis and S. Fahmy, HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004.
DOI : 10.1109/TMC.2004.41

G. Behrmann, A. David, and K. G. Larsen, A Tutorial on Uppaal, Formal Methods for the Design of Real-Time Systems, pp.200-236, 2004.
DOI : 10.1007/978-3-540-30080-9_7

R. Alur and D. Dill, A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994.
DOI : 10.1016/0304-3975(94)90010-8

R. Alur, C. Courcoubetis, and D. L. Dill, Model-checking for real time systems, Proceedings of the fifth Symposium on Logic In Computer Science (LICS'90), pp.414-425, 1990.

T. A. Henzinger, Symbolic model checking for real-time systems, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science, pp.193-244, 1994.
DOI : 10.1109/LICS.1992.185551

G. J. Holzmann, Software Model Checking, NATO Summer School, IOS Press Computer and System Sciences, vol.180, pp.309-355, 2000.
DOI : 10.1007/978-0-387-35578-8_28

D. Rakhmatov and S. Vrudhula, An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001.
DOI : 10.1109/ICCAD.2001.968687