L. Apa and C. Hollman, Compromising industrial facilities from 40 miles away, presented at the Black Hat USA Conference, 2013.

C. Badenhop and B. Mullins, A black hole attack model using topology approximation for reactive ad-hoc routing protocols, International Journal of Security and Networks, vol.9, issue.2, pp.63-77, 2014.
DOI : 10.1504/IJSN.2014.060755

W. Boyes, All quiet on the wireless front, Control Global, Schaumburg , Illinois (www.controlglobal.com/articles, 2011.

C. Dubendorfer, B. Ramsey, and M. Temple, ZigBee Device Verification for Securing Industrial Control and Building Automation Systems, Critical Infrastructure Protection VII, pp.47-62, 2013.
DOI : 10.1007/978-3-642-45330-4_4

URL : https://hal.archives-ouvertes.fr/hal-01456892

B. Fouladi and S. Ghanoun, Security evaluation of the Z-Wave wireless protocol, presented at the Black Hat USA Conference, 2013.

F. Semiconductor and F. Beestack, Application Development Guide, Document Number: BSADG Rev, 2008.

. Inguardians, Converting Radio Signals to Data Packets: Examination of Using GNU Radio Companion for Security Research and Assessment, p.2014

M. Li, I. Koutsopoulos, and R. Poovendran, Optimal jamming attack strategies and network defense policies in wireless sensor networks, IEEE Transactions on Mobile Computing, vol.9, issue.8, pp.1119-1133, 2010.

G. Noubir, Robust wireless infrastructure against jamming attacks, in Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp.123-145, 2012.

K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.245-257, 2011.
DOI : 10.1109/SURV.2011.041110.00022

J. Picod, A. Lebrun, and J. Demay, Bringing software defined radio to the penetration testing community, presented at the Black Hat USA Conference, 2014.

B. Ramsey and B. Mullins, Defensive rekeying strategies for physical-layermonitored low-rate wireless personal area networks, pp.63-79, 2013.
DOI : 10.1007/978-3-642-45330-4_5

B. Ramsey, B. Mullins, R. Speers, and K. Batterton, Watching for Weakness in Wild WPANs, MILCOM 2013, 2013 IEEE Military Communications Conference, pp.1404-1409, 2013.
DOI : 10.1109/MILCOM.2013.238

B. Ramsey, T. Stubbs, B. Mullins, M. Temple, and M. Buckner, Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers, International Journal of Critical Infrastructure Protection, vol.8, pp.27-39, 2015.
DOI : 10.1016/j.ijcip.2014.11.002

URL : http://dx.doi.org/10.1016/j.ijcip.2014.11.002

B. Reaves and T. Morris, Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems, International Journal of Critical Infrastructure Protection, vol.5, issue.3-4, pp.154-174, 2012.
DOI : 10.1016/j.ijcip.2012.10.001

L. Schauer, F. Dorfmeister, and M. Maier, Potentials and limitations of WIFI-positioning using Time-of-Flight, International Conference on Indoor Positioning and Indoor Navigation, 2013.
DOI : 10.1109/IPIN.2013.6817861

S. Designs, Wave Products, Fremont, California (z-wave.sigma designs, p.2015

M. Strasser, B. Danev, and S. Capkun, Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks, vol.7, issue.2, 2010.
DOI : 10.1145/1824766.1824772

C. Wright, L. Ballard, S. Coull, F. Monrose, and G. Masson, Uncovering Spoken Phrases in Encrypted Voice over IP Conversations, ACM Transactions on Information and System Security, vol.13, issue.4, 2010.
DOI : 10.1145/1880022.1880029

W. Xu, W. Trappe, Y. Zhang, and T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005.
DOI : 10.1145/1062689.1062697

Z. Zensys and . Datasheet, Document No. DSH10756, version 6, Fremont, California (media.digikey.com/pdf, 2007.