I. Aad, J. Hubaux, and E. W. Knightly, Impact of Denial of Service Attacks on Ad Hoc Networks, IEEE/ACM Transactions on Networking, vol.16, issue.4, 2008.
DOI : 10.1109/TNET.2007.904002

Z. Bar-yossef, R. Friedman, and G. Kliot, RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks, ACM Transactions on Computer Systems, vol.26, issue.2, pp.1-66, 2008.
DOI : 10.1145/1365815.1365817

U. Cetintemel, A. Flinders, and Y. Sun, Power-efficient data dissemination in wireless sensor networks, Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access , MobiDe '03, 2003.
DOI : 10.1145/940923.940925

P. Gupta and P. Kumar, Critical Power for Asymptotic Connectivity in Wireless Networks, Stochastic Analysis, Control, Optimization and Applications, 1998.
DOI : 10.1007/978-1-4612-1784-8_33

C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed diffusion, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345920

S. Mishra, J. Deng, and R. Han, Insens: Intrusion-tolerant routing in wireless sensor networks, IEEE ICDCS, 2003.

W. R. Pires-junior, T. H. De, P. Figueiredo, and H. Wong, Malicious node detection in wireless sensor networks, IEEE IPDPS, 2004.

C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, 1st IEEE Workshop on Sensor Network Protocols and Applications (SNPA), 2003.

D. Bhaskar-krishnamachari, S. Estrin, and . Wicker, The impact of data aggregation in wireless sensor networks, Proceedings 22nd International Conference on Distributed Computing Systems Workshops, 2002.
DOI : 10.1109/ICDCSW.2002.1030829

F. Le-fessant, C. Sengul, and A. Kermarrec, Pace-maker: Tracking peer availability in large networks, 2008.

S. Lee and Y. Choi, A secure alternate path routing in sensor networks, Computer Communications, vol.30, issue.1, p.30, 2006.
DOI : 10.1016/j.comcom.2006.08.006

K. Arjen, E. R. Lenstra, and . Verheul, Selecting cryptographic key sizes, PKC, 2000.

Z. Liu, A. W. Joy, and R. A. Thompson, A dynamic trust model for mobile ad hoc networks, Future Trends of Dist. Computing Systems, 2004.

S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks, 2002.

D. J. Malan, M. Welsh, and M. D. Smith, Implementing public-key infrastructure for sensor networks, ACM Transactions on Sensor Networks, vol.4, issue.4, pp.1-23, 2008.
DOI : 10.1145/1387663.1387668

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345955

D. H. Mckinight and A. E. Kamal, The meanings of trust, 1996.

P. Mukherjee and S. Sen, Detecting malicious sensor nodes from learned data patterns, Agent Technology for Sensor Networks, 2007.

P. Mukherjee and S. Sen, Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks, ICDCN, 2008.
DOI : 10.1007/978-3-540-77444-0_35

L. B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. López et al., Identity-Based Encryption for Sensor Networks, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007.
DOI : 10.1109/PERCOMW.2007.56

Y. Sun, Z. Han, W. Yu, and K. J. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2007.
DOI : 10.1109/INFOCOM.2006.154

F. Ye, A. Chen, S. Lu, and L. Zhang, Gradient broadcast: A robust, long-live large sensor network, 2001.

F. Ye, A. Chen, S. Lu, and L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, Conf. on Computer Communications and Networks, 2001.

B. Yu and B. Xao, Detecting selective forwarding attacks in wireless sensor networks, IEEE IPDPS, 2006.

W. Yu and K. J. Liu, Attack-resistant cooperation stimulation in autonomous ad hoc networks, IEEE/ACM Trans. on Networking, 2005.

Y. Zhao, R. Govindan, and D. Estrin, Residual energy scans for monitoring wireless sensor networks, IEEE WCNC, 2002.

A. Seyit, B. Çamtepe, and . Yener, Key distribution mechanisms for wireless sensor networks: a survey, IEEE/ACM Trans. on Networking, 2005.

.. Routing-protocols-comparison, 13 5.3.1 Performance in RESIST-0 Case, 14 5.3.2 Performance in RESIST-1 and vulnerable cases . . . . . . . . 15

R. Protocols and .. , The Impact of Collusion on, p.17