S. Alouneh, A. Agarwal, and A. En-nouaary, A novel path protection scheme for MPLS networks using multi-path routing, Computer Networks, vol.53, issue.9, pp.1530-1545, 2009.
DOI : 10.1016/j.comnet.2009.02.001

L. Zhou and Z. J. Haas, Securing ad hoc networks, IEEE Network, vol.13, issue.6, pp.24-38, 1999.
DOI : 10.1109/65.806983

Y. Mao, A feedback-based multipath approach for secure data collection in wireless sensor networks, Ubiquitous Computing and Communication Journal, vol.5, issue.2, pp.27-32, 2010.

H. Alzaid, E. Foo, and J. G. Nieto, Secure data aggregation in wireless sensor network: a survey, Proceedings of the 6th Australasian Information Security Conference (AISC'08), pp.93-105, 2008.

M. A. Simplicio, B. T. Jr, P. S. De-oliveira, C. B. Barreto, T. C. Margi et al., Comparison of authenticatedencryption schemes in wireless sensor networks, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, pp.454-461, 2011.

P. Ballarini, L. Mokdad, and Q. Monnet, Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, vol.30, issue.8, 2013.
DOI : 10.1002/sec.630

URL : https://hal.archives-ouvertes.fr/hal-00832082

S. K. Singh, M. P. Singh, and D. K. Singh, A survey on network security and attack defense mechanism for wireless sensor networks, International Journal of Computer Trends and Technology, 2011.

E. Stavrou and A. Pitsillides, A survey on secure multipath routing protocols in WSNs, Computer Networks, vol.54, issue.13, pp.2215-2238, 2010.
DOI : 10.1016/j.comnet.2010.02.015

J. Ben-othman and L. Mokdad, Enhancing data security in ad hoc networks based on multipath routing, Journal of Parallel and Distributed Computing, vol.70, issue.3, pp.309-316, 2010.
DOI : 10.1016/j.jpdc.2009.02.010

K. Wang, X. Zou, and Y. Sui, A Multiple Secret Sharing Scheme based on Matrix Projection, 2009 33rd Annual IEEE International Computer Software and Applications Conference, pp.400-405, 2009.
DOI : 10.1109/COMPSAC.2009.60

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176