Slot scheduling for wireless sensor networks, Journal of Computational Methods in Science and Engineering, vol.12, issue.1, pp.1-12, 2012. ,
Classification of usual protocols over Wireless Sensor Networks, 2012 IEEE International Conference on Communications (ICC), pp.622-626, 2012. ,
DOI : 10.1109/ICC.2012.6363868
Distributed backtracking algorithm based on tree decomposition over wireless sensor networks, Concurrency and Computation: Practice and Experience, pp.728-742, 2013. ,
DOI : 10.1002/cpe.1804
URL : https://hal.archives-ouvertes.fr/hal-01277562
Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, vol.53, issue.12, pp.2022-2037, 2009. ,
DOI : 10.1016/j.comnet.2009.02.023
Comparison of authenticatedencryption schemes in wireless sensor networks, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, pp.454-461, 2011. ,
Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, pp.100-111, 2007. ,
DOI : 10.1016/j.adhoc.2006.05.009
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002. ,
DOI : 10.1145/381677.381696
Wireless sensor networks: a networking perspective, 2009. ,
DOI : 10.1002/9780470443521
A survey on network security and attack defense mechanism for wireless sensor networks, International Journal of Computer Trends and Technology, 2011. ,
An efficient intrusion detection framework in cluster-based wireless sensor networks, Security and Communication Networks, pp.1211-1224, 2013. ,
DOI : 10.1002/sec.687
Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010. ,
DOI : 10.5121/ijasuc.2010.1301
A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the third international workshop on Security, Privacy and trust in Pervasive and Ubiquitous computing (SECPerU'07), pp.25-30, 2007. ,
Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks, Advances in Computer Science: an International Journal, vol.2, issue.3, pp.105-117, 2013. ,
Detecting denial of service attacks in sensor networks, Journal of Computers, vol.4, issue.18, 2008. ,
Low energy adaptive clustering hierarchy with deterministic cluster-head selection, 4th International Workshop on Mobile and Wireless Communications Network, pp.368-372, 2002. ,
DOI : 10.1109/MWCN.2002.1045790
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.1771
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364158
Modeling tools for detecting DoS attacks in WSNs, Security and Communication Networks, pp.420-436, 2013. ,
DOI : 10.1002/sec.630
URL : https://hal.archives-ouvertes.fr/hal-00832082
Security of wireless sensor network, 2009. ,
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol.3, issue.4, pp.366-379, 2004. ,
DOI : 10.1109/TMC.2004.41
An analytical high-level battery model for use in energy management of portable electronic systems, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pp.488-493, 2001. ,
DOI : 10.1109/ICCAD.2001.968687