L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

R. H. Weber, Internet of Things ??? New security and privacy challenges, Computer Law & Security Review, vol.26, issue.1, pp.23-30, 2010.
DOI : 10.1016/j.clsr.2009.11.008

F. Zhao and L. J. Guibas, Wireless Sensor Networks: An Information Processing Approach, 2004.

Y. Wang, . Attebury, and B. Ramamurthy, A survey of security issues in wireless sensor networks, IEEE Communications Surveys & Tutorials, vol.8, issue.2, pp.2-23, 2006.
DOI : 10.1109/COMST.2006.315852

Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu et al., A survey of key management schemes in wireless sensor networks, Computer Communications, vol.30, issue.11-12, pp.2314-2341, 2007.
DOI : 10.1016/j.comcom.2007.04.009

M. A. Jr, . Simplicio, P. S. Barreto, . Margi, B. Cintia et al., A Survey on Key Management Mechanisms for Distributed Wireless Sensor Networks, Computer Networks, vol.54, issue.15, pp.2591-2612, 2010.

D. E. Bell and L. J. Lapadula, Secure computer systems: mathematical foundations and model, p.MTR, 1973.

W. Lu and M. K. Sundareshan, A model for multilevel security in computer networks, IEEE Transactions on Software Engineering, vol.16, issue.6, pp.647-659, 1990.
DOI : 10.1109/32.55093

E. Winjum and T. J. Berg, Multilevel security for IP routing, MILCOM 2008, 2008 IEEE Military Communications Conference, pp.1-8, 2008.
DOI : 10.1109/MILCOM.2008.4753318

. Teng, . Po-yuan, . Huang, . Shih-i, and A. Perrig, Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks, Proceedings of The IFIP TC 11 23rd International Information Security Conference, pp.705-709, 2008.
DOI : 10.1007/978-0-387-09699-5_49

. Panja, . Biswajit, S. Madria, and B. Kumar, A role-based access in a hierarchical sensor network architecture to provide multilevel security, Computer Communications, vol.31, issue.4, pp.793-806, 2008.
DOI : 10.1016/j.comcom.2007.10.036

. Lee, . Jongdeog, S. H. Son, and M. Singhal, Design of an architecture for multiple security levels in wireless sensor networks, 2010 Seventh International Conference on Networked Sensing Systems (INSS), pp.107-114, 2010.
DOI : 10.1109/INSS.2010.5573944

C. Blundo, A. Santis, . De, . Herzberg, . Amir et al., Perfectly-secure key distribution for dynamic conferences, 12th Annual International Cryptology Conference on Advances in Cryptology, pp.471-486, 1993.
DOI : 10.1007/3-540-48071-4_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.2687