G. Edward and . Amoroso, Fundamentals of computer security technology, 1994.

K. Arisha, M. Youssef, and M. Younis, Energy-Aware TDMA-Based MAC for Sensor Networks, 2002.
DOI : 10.1007/0-306-47720-3_2

T. Aura, P. Nikander, and J. Leiwo, DOS-Resistant Authentication with Client Puzzles, Lecture Notes in Computer Science, vol.2133, p.170, 2001.
DOI : 10.1007/3-540-44810-1_22

A. Becher, Z. Benenson, and M. Dornseif, Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, 2006.
DOI : 10.1007/11734666_9

C. Bekara and M. Laurent-maknavicius, A new protocol for securing wireless sensor networks against nodes replication attacks. Wireless and Mobile Computing, Networking and Communications. WiMOB, Third IEEE International Conference on, pp.5959-5967, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01355352

F. Benali, V. Legrand, and S. Ubéda, An ontology for the management of heteregenous alerts of information system, The 2007 International Conference on Security and Management (SAM'07), 2007.
URL : https://hal.archives-ouvertes.fr/inria-00395597

S. Capkun, L. Buttyán, and J. Hubaux, Sector: secure tracking of node encounters in multi-hop wireless networks, SASN, p.2132, 2003.

F. B. Cohen, Information system attacks: A preliminary classification scheme, Computers and Security, p.2946, 1997.
DOI : 10.1016/S0167-4048(97)85785-9

J. Douceur, The Sybil Attack, 2002.
DOI : 10.1007/3-540-45748-8_24

A. El-hoiydi, J. Decotignie, C. Enz, and E. L. Roux, Poster abstract, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, p.302303, 2003.
DOI : 10.1145/958491.958531

D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-resilient, energy-ecient multipath routing in wireless sensor networks, 2001.

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, NDSS, 2004.

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209219

D. Icove, K. Seger, and W. R. Vonstorch, Computer crime: a crimeghter's handbook, 1995.

E. Jung and N. Vaidya, A power control MAC protocol for ad hoc networks, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, 2002.
DOI : 10.1145/570645.570651

C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures

Y. Wei-law, J. Lodewijk-van-hoesel, P. Doumen, P. Hartel, and . Havinga, Energy-ecient link-layer jamming attacks against wireless sensor network mac protocols, SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, p.7688, 2005.

J. Li and G. Y. Lazarou, A bit-map-assisted energy-ecient mac scheme for wireless sensor networks, IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks, p.5560, 2004.

U. Lindqvist and E. Jonsson, How to systematically classify computer security intrusions, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601330

H. Liu, H. Ma, M. E. Zarki, and S. Gupta, Error control schemes for networks: An overview, Mobile Networks and Applications, p.167182, 1997.

G. Lu, B. Krishnamachari, and C. Raghavendra, An adaptive energy-ecient and low-latency mac for data gathering in sensor networks, 2004.

G. Peter and . Neumann, Computer related risks, 1995.

J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, p.259268, 2004.
DOI : 10.1145/984622.984660

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, p.189199, 2001.
DOI : 10.1145/381677.381696

T. Van, D. , and K. Langendoen, An adaptive energy-ecient mac protocol for wireless sensor networks

W. Wang and B. K. Bhargava, Visualization of wormholes in sensor networks, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, p.5160, 2004.
DOI : 10.1145/1023646.1023657

A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, p.5462, 2002.
DOI : 10.1109/MC.2002.1039518

A. D. Wood, J. A. Stankovic, and S. H. Son, JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp.286297-286300, 2003.
DOI : 10.1109/REAL.2003.1253275

W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks: attack and defense strategies, Network IEEE, vol.20, issue.3, p.4147, 2006.

W. Znaidi, M. Minier, and J. Babau, Detecting wormhole attacks in wireless networks using local neighborhood information, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008.
DOI : 10.1109/PIMRC.2008.4699583

URL : https://hal.archives-ouvertes.fr/hal-00402737

I. Unité-de-recherche and . Rhône, Alpes 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4

I. Unité-de-recherche and . Lorraine, Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004.

I. De-voluceau-rocquencourt, BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399