N. A. Alrajeh, S. Khan, and B. Shams, Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks, vol.4, issue.2, p.2013, 2013.
DOI : 10.1109/WCICA.2006.1712371

Y. B. Reddy, A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks, 2009 Third International Conference on Sensor Technologies and Applications, pp.462-468, 2009.
DOI : 10.1109/SENSORCOMM.2009.76

M. Haghighi and D. Cliff, Sensomax: An agent-based middleware for decentralized dynamic data-gathering in wireless sensor networks, 2013 International Conference on Collaboration Technologies and Systems (CTS), pp.107-114, 2013.
DOI : 10.1109/CTS.2013.6567214

P. Ilia, G. Oikonomou, T. Tryfonas, and . In, Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks, Lecture Notes in Computer Science, vol.7886, pp.34-49, 2013.
DOI : 10.1007/978-3-642-38530-8_3

URL : https://hal.archives-ouvertes.fr/hal-01485932

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless sensor network security: A survey, in book chapter of security, Distributed, Grid, and Pervasive Computing, pp.0-849, 2007.

J. Omic, A. Orda, and P. Van-mieghem, Protecting Against Network Infections: A Game Theoretic Perspective, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.1485-1493, 2009.
DOI : 10.1109/INFCOM.2009.5062065

T. Spyridopoulos, G. Oikonomou, T. Tryfonas, and M. Ge, Game theoretic approach for costbenefit analysis of malware proliferation prevention, Security and Privacy Protection in Information Processing Systems, pp.28-41, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01463844

M. Tambe and B. An, Game theory for security: A real-world challenge problem for multiagent systems and beyond, AAAI Spring Symposium: Game Theory for Security, Sustainability , and Health, 2012.
DOI : 10.1017/CBO9780511973031

S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya et al., A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010.
DOI : 10.1109/HICSS.2010.35

T. Spyridopoulos, G. Karanikas, T. Tryfonas, and G. Oikonomou, A game theoretic defence framework against DoS/DDoS cyber attacks, Computers & Security, vol.38, pp.39-50, 2013.
DOI : 10.1016/j.cose.2013.03.014

Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla, On modeling and simulation of game theorybased defense mechanisms against dos and ddos attacks, Proceedings of the 2010 spring simulation multiconference, p.159, 2010.

M. Asadi, C. Zimmerman, and A. Agah, A game-theoretic approach to security and power conservation in wireless sensor networks, IJ Network Security, vol.15, issue.1, pp.50-58, 2013.

B. Chandrasekaran, Survey of network traffic models. Waschington University in St, Louis CSE, vol.567, 2009.

H. S. Bedi, S. Roy, and S. Shiva, Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.129-136, 2011.
DOI : 10.1109/CICYBS.2011.5949407

M. Haghighi, An Agent-Based Multi-Model Tool for Simulating Multiple Concurrent Applications in WSNs, 5th International Conference on Communication Software and Networks. (2013) 16. ¨ Osterlind, F.: A sensor network simulator for the contiki os, 2006.
DOI : 10.7763/JACN.2013.V1.54

G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of ipv6 packets over ieee 802.15, 2007.

T. Winter, Rpl: Ipv6 routing protocol for low-power and lossy networks, 2012.
DOI : 10.17487/rfc6550