T. Bernard and H. Fouchal, Slot scheduling for wireless sensor networks, Journal of Computational Methods in Science and Engineering, vol.12, issue.1, pp.1-12, 2012.

C. Ramassamy, H. Fouchal, and P. Hunel, Classification of usual protocols over Wireless Sensor Networks, 2012 IEEE International Conference on Communications (ICC), pp.622-626, 2012.
DOI : 10.1109/ICC.2012.6363868

H. Fouchal and Z. Habbas, Distributed backtracking algorithm based on tree decomposition over wireless sensor networks, Concurrency and Computation: Practice and Experience, pp.728-742, 2013.
DOI : 10.1002/cpe.1804

URL : https://hal.archives-ouvertes.fr/hal-01277562

S. Ozdemir and Y. Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009.
DOI : 10.1016/j.comnet.2009.02.023

M. A. Simplicio, B. T. Jr, P. S. De-oliveira, C. B. Barreto, T. C. Margi et al., Comparison of authenticatedencryption schemes in wireless sensor networks, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, pp.454-461, 2011.

K. Wu, D. Dreef, B. Sun, and Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007.
DOI : 10.1016/j.adhoc.2006.05.009

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

J. Zheng and A. Jamalipour, Wireless sensor networks: a networking perspective, 2009.
DOI : 10.1002/9780470443521

S. K. Singh, M. P. Singh, and D. K. Singh, A survey on network security and attack defense mechanism for wireless sensor networks, International Journal of Computer Trends and Technology, 2011.

H. Sedjelmaci, S. M. Senouci, and M. Feham, An efficient intrusion detection framework in cluster-based wireless sensor networks, Security and Communication Networks, pp.1211-1224, 2013.
DOI : 10.1002/sec.687

M. Momani and S. Challa, Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010.
DOI : 10.5121/ijasuc.2010.1301

M. C. Fernández-gago, R. Román, and J. Lopez, A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the third international workshop on Security, Privacy and trust in Pervasive and Ubiquitous computing (SECPerU'07), pp.25-30, 2007.

M. R. Rohbanian, M. R. Kharazmi, A. Keshavarz-haddad, and M. Keshtgary, Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks, Advances in Computer Science: an International Journal, vol.2, issue.3, pp.105-117, 2013.

G. H. Lai and C. Chen, Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008.

M. J. Handy, M. Haase, and D. Timmerman, Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002.
DOI : 10.1109/MWCN.2002.1045790

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.1771

M. Guechari, L. Mokdad, and S. Tan, Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364158

P. Ballarini, L. Mokdad, and Q. Monnet, Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013.
DOI : 10.1002/sec.630

URL : https://hal.archives-ouvertes.fr/hal-00832082

J. Rehana, Security of wireless sensor network, 2009.

O. Younis and S. Fahmy, HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004.
DOI : 10.1109/TMC.2004.41

D. Rakhmatov and S. Vrudhula, An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001.
DOI : 10.1109/ICCAD.2001.968687