C. S. Murthy and B. S. Manoj, Ad Hoc Wireless Sensor Networks Architectures and Protocols, 2004.

G. Guimarães, E. Souto, D. F. Sadok, and J. Kelner, Evaluation of Security Mechanisms in Wireless Sensor Networks, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), pp.428-433, 2005.
DOI : 10.1109/ICW.2005.47

C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, 2005.

Z. Yan, P. Zhang, and T. Virtanen, Trust Evaluation Based Security Solution in Ad hoc Networks, 2003.

P. Dasgupta, Trust As a Commodity: Trust Making and Breaking Cooperative Relations, pp.49-72, 2000.

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision. Decision Support Systems, pp.618-644, 2007.

C. Keser, Experimental games for the design of reputation management systems, IBM Systems Journal, vol.42, issue.3, pp.498-506, 2003.
DOI : 10.1147/sj.423.0498

R. Ismail and A. Jøsang, The beta reputation system, Proceedings of the 15th Bled Conference on Electronic Commerce, 2002.

J. A. Golbeck, Computing and applying trust in web-based social networks The thesis is retrieved 24 th of, 2005.

R. A. Shaikh, H. Jameel, B. J. Auriol, H. Lee, S. Lee et al., Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.11, pp.1698-1712, 2009.
DOI : 10.1109/TPDS.2008.258

H. Alzaid, E. Foo, and J. G. Nieto, RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.419-424, 2008.
DOI : 10.1109/PDCAT.2008.52

A. Boukerche and Y. Ren, A trust-based security system for ubiquitous and pervasive computing environments, Computer Communications, vol.31, issue.18, pp.4343-4351, 2008.
DOI : 10.1016/j.comcom.2008.05.007

S. Buchegger and J. L. Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.226-236, 2002.
DOI : 10.1145/513800.513828

A. Srinivasan, F. Li, and J. Wu, A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks, 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp.364-369, 2008.
DOI : 10.1109/ICDCS.Workshops.2008.17

A. Srinivasan, J. Teitelbaum, and J. Wu, DRBTS: Distributed Reputation-based Beacon Trust System, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp.277-283, 2006.
DOI : 10.1109/DASC.2006.28

D. Xiao, J. Feng, and H. Zhang, A formal reputation system for trusting wireless sensor network, Wuhan University Journal of Natural Sciences, vol.10, issue.1, pp.173-179, 2008.
DOI : 10.1007/s11859-008-0209-y

Z. Yao, D. Kim, and Y. Doh, PLUS: parameterised localised trust management-based security framework for sensor networks, International Journal of Sensor Networks, vol.3, issue.4, pp.224-236, 2008.
DOI : 10.1504/IJSNET.2008.019005

C. Karlof and D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, pp.293-315, 2003.

P. Michiardi and R. Molva, Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks, 2002.

K. Kifayat, M. Merabti, Q. Shi, and D. Llewellyn-jones, Security in Wireless Sensor Networks, pp.513-552, 2010.
DOI : 10.1007/978-3-642-04117-4_26

H. Alzaid, E. Foo, and J. M. Nieto, Secure data aggregation in wireless sensor network: A survey, Proceedings of the 6 th Australasian conference on Information security,AISC'08, pp.93-105, 2008.

R. Ismail, Security of Reputation Systems The thesis is retrieved 24 th of, 2004.

A. Jøsang and J. Golbeck, Challenges for Robust Trust and Reputation Systems, Proceedings of the 5th International Workshop on Security and Trust Management (STM'09), pp.1-6, 2009.

M. Feldman and J. Chuang, Overcoming free-riding behavior in peer-to-peer systems, ACM SIGecom Exchanges, vol.5, issue.4, pp.41-50, 2005.
DOI : 10.1145/1120717.1120723

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Communications and Multimedia Security, pp.107-121, 2002.
DOI : 10.1007/978-0-387-35612-9_9

A. Boukerche, L. Xu, and K. El-khatib, Trust-based security for wireless ad hoc and sensor networks, Computer Communications, vol.30, issue.11-12, pp.11-12, 2007.
DOI : 10.1016/j.comcom.2007.04.022

A. Jøsang, X. Luo, and X. Chen, Continuous Ratings in Discrete Bayesian Reputation Systems, Proceedings of the 2 nd Joint iTrust and PST Conference on Privacy, Trust Management and Security, pp.151-166, 2008.
DOI : 10.1007/978-0-387-09428-1_10

D. Bernoulli, Exposition of a New Theory on the Measurement of Risk, Econometrica, vol.22, issue.1, pp.23-36, 1954.
DOI : 10.2307/1909829

O. Morgenstern and J. V. Neumann, Theory of Games and Economic Behavior, 1980.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

H. Chen, H. Wu, J. Hu, and C. Gao, Agent-Based Trust Management Model for Wireless Sensor Networks, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008), pp.150-154, 2008.
DOI : 10.1109/MUE.2008.65

H. Chen, Task-based Trust Management for Wireless Sensor Networks ¨ Ozdemir S.: Functional Reputation Based Data Aggregation for Wireless Sensor Networks, Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'08, pp.21-26, 2008.

S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, Reputation-based framework for high integrity sensor networks, ACM Transactions on Sensor Networks, vol.4, issue.3, pp.1-37, 2008.
DOI : 10.1145/1362542.1362546

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.7636

H. Chen, H. Wu, X. Zhou, and C. Gao, Reputation-based Trust in Wireless Sensor Networks, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), pp.603-607, 2007.
DOI : 10.1109/MUE.2007.181

J. Sen and S. Krishna, An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks, p.380, 1111.

G. V. Crosby, L. Hester, and N. Pissinou, Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks, International Journal on Network Security, vol.12, issue.2, pp.107-117, 2011.

C. Perez-toro, R. Panta, and S. Bagchi, RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.1-9, 2010.
DOI : 10.1109/SECON.2010.5508273