G. Noubir, A. Chan, X. Liu, and B. Thapa, Broadcast control channel jamming: Resilience and identification of traitors, IEEE International Symposium on Information Theory (ISIT), pp.2496-2500, 2007.

M. Durresi, A. Durresi, V. Paruchuri, and L. Barolli, Anonymous Routing for Mobile Wireless Ad Hoc Networks, International Journal of Distributed Sensor Networks, vol.24, issue.2, pp.105-117, 2007.
DOI : 10.1080/15501320601069846

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002.
DOI : 10.1016/S1389-1286(01)00302-4

A. Alarifi and W. Du, Diversify sensor nodes to improve resilience against node compromise, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.101-112, 2006.
DOI : 10.1145/1180345.1180359

H. Alzaid, E. Foo, and J. G. Nieto, Secure data aggregation in wireless sensor network: a survey, Proceedings of the 6th Australasian Information Security Conference (AISC), pp.93-105, 2008.

L. Andersson, E. Davies, and L. Zhang, Report from the IAB workshop on Unwanted Traffic, RFC, vol.4948, 2006.

B. Azimi-sadjadi, A. Kiayias, A. Mercado, and B. Yener, Robust key generation from signal envelopes in wireless networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.401-410, 2007.
DOI : 10.1145/1315245.1315295

A. Becher, Z. Benenson, and M. Dornseif, Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, Sicherheit -Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), pp.26-29, 2006.
DOI : 10.1007/11734666_9

H. Su-mon-bo, A. Xiao, J. A. Adereti, B. Malcolm, and . Christianson, A performance comparison of wireless ad hoc network routing protocols under security attack, Proceedings of the 3d International Symposium on Information Assurance and Security (IAS), pp.50-55, 2007.

E. Mykletun, C. Castelluccia, A. Chan, and G. Tsudik, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions Sensor Networks, vol.5, issue.3, pp.1-36, 2009.

H. Chan, A. Perrig, and D. X. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy (S&P ), p.197, 2003.

H. Chan, A. Perrig, and D. X. Song, Secure hierarchical in-network aggregation in sensor networks, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.278-287, 2006.
DOI : 10.1145/1180405.1180440

D. Chen, S. Garg, and K. S. Trivedi, Network survivability performance evaluation:, Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems , MSWiM '02, pp.61-68, 2002.
DOI : 10.1145/570758.570769

J. T. Chiang and Y. Hu, Cross-layer jamming detection and mitigation in wireless broadcast networks, Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (MO- BICOM), pp.346-349, 2007.

K. M. Shazzad, D. S. Kim, and J. S. Park, A framework of survivability model for wireless sensor network, Proceedings of the The 1st International Conference on Availability, Reliability and Security (ARES), pp.515-522, 2006.

J. Girão, D. Westhoff, and M. Acharya, Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation, IEEE Transactions on Mobile Computing, vol.5, issue.10, pp.1417-1431, 2006.

Y. Deswarte and D. Powell, Internet Security: An Intrusion-Tolerance Approach, Proceedings of the IEEE ISSN, pp.432-473, 2006.
DOI : 10.1109/JPROC.2005.862320

D. Djenouri, L. Khelladi, and N. Badache, A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys & Tutorials, vol.7, issue.4, pp.2-28, 2005.
DOI : 10.1109/COMST.2005.1593277

J. Domingo-ferrer, A Provably Secure Additive and Multiplicative Privacy Homomorphism*, 5th International Conference on Information Security (ISC), pp.471-483, 2002.
DOI : 10.1007/3-540-45811-5_37

R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, Survivable network system analysis: a case study, IEEE Software, vol.16, issue.4, pp.70-77, 1999.
DOI : 10.1109/52.776952

D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-resilient, energy-efficient multipath routing in wireless sensor networks, Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.251-254, 2001.

B. Przydatek, H. Chan, A. Perrig, and D. Song, SIA, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.69-102, 2007.
DOI : 10.1145/958491.958521

E. Hamida, G. Chelius, and J. Gorce, Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation, pp.127-134, 2008.
DOI : 10.1109/PADS.2008.12

URL : https://hal.archives-ouvertes.fr/inria-00384134

L. Hu and D. Evans, Secure aggregation for wireless network, Symposium on Applications and the Internet Workshops (SAINT), pp.384-394, 2003.

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, Proceedings of the Network and Distributed System Security Symposium (NDSS), pp.1-11, 2004.

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003.
DOI : 10.1109/INFCOM.2003.1209219

Y. C. Hu, A. Perrig, and D. B. Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005.
DOI : 10.1145/570645.570648

Y. Huang and W. Lee, Attack Analysis and Detection for Ad Hoc Routing Protocols, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), pp.125-145, 2004.
DOI : 10.1007/978-3-540-30143-1_7

B. Bavar, J. Dong, K. E. Ackermann, and C. Nita-rotaru, Mitigating attacks against virtual coordinate based routing in wireless sensor networks, Proceedings of the 1st ACM Conference on Wireless Network Security (WISEC), pp.89-99, 2008.

H. J. Hur, Y. Lee, and H. Yoon, Trust Management for Resilient Wireless Sensor Networks, 8th International Conference on Information Security and Cryptology (ICISC), pp.56-68, 2005.
DOI : 10.1007/11734727_7

C. Wan, J. Mache, and M. D. Yarvis, Exploiting heterogeneity for sensor network security, Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.591-593, 2008.

P. Jadia and A. Mathuria, Efficient Secure Aggregation in Sensor Networks, 11th International Conference on High Performance Computing (HiPC), pp.40-49, 2004.
DOI : 10.1007/978-3-540-30474-6_10

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, pp.153-181, 1996.
DOI : 10.1007/978-0-585-29603-6_5

C. Karlof and D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, pp.293-315, 2003.

B. Karp and H. T. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000.
DOI : 10.1145/345910.345953

K. Kim, W. Jung, J. Park, H. Seo, S. Jo et al., A Resilient Multipath Routing Protocol for Wireless Sensor Networks, 4th International Conference on Networking (ICN), pp.1122-1129, 2005.
DOI : 10.1007/978-3-540-31957-3_128

X. Li and D. Yang, A quantitative survivability evaluation model for wireless sensor networks, IEEE International Conference on Networking, Sensing and Control, pp.727-732, 2006.

M. N. Lima, A. L. Santos, and G. Pujolle, A survey of survivability in mobile ad hoc networks, IEEE Communications Surveys & Tutorials, vol.11, issue.1, pp.1-3, 2009.
DOI : 10.1109/SURV.2009.090106

URL : https://hal.archives-ouvertes.fr/hal-01168681

M. N. Lima, H. W. Da-silva, A. L. Santos, and G. Pujolle, Survival multipath routing for MANETs, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.425-432, 2008.
DOI : 10.1109/NOMS.2008.4575164

URL : https://hal.archives-ouvertes.fr/hal-01303595

L. V. Mancini, M. Conti, R. D. Pietro, and A. Mei, Emergent properties: detection of the node-capture attack in mobile wireless sensor networks, Proceedings of the 1st ACM Conference on Wireless Network Security (WISEC), pp.214-219, 2008.

A. Mahimkar and T. S. Rappaport, SecureDAV: a secure data aggregation and verification protocol for sensor networks, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.2175-2179, 2004.
DOI : 10.1109/GLOCOM.2004.1378395

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.8423

C. Schurgers-mani and M. B. Srivastava, Energy efficient routing in wireless sensor networks, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.357-361, 2001.
DOI : 10.1109/MILCOM.2001.985819

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

C. A. Melchor, B. Ait-salem, P. Gaborit, and K. Tamine, Active detection of node replication attacks, International Journal of Computer Science and Network Security (IJCSNS), vol.9, pp.13-21, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00464634

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, 6th Joint Working Conference on Communications and Multimedia Security, Advanced Communications and Multimedia Security, pp.107-121, 2002.
DOI : 10.1007/978-0-387-35612-9_9

R. Molva and P. Michiardi, Security in Ad Hoc Networks, 8th International Conference on Personal Wireless Communications (PWC), pp.756-775, 2003.
DOI : 10.1007/978-3-540-39867-7_69

U. Shankar, N. Sastry, and D. Wagner, Secure verification of location claims, Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe), pp.1-10, 2003.

J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004.
DOI : 10.1145/984622.984660

P. Ning and K. Sun, How to misuse aodv: a case study of insider attacks against mobile ad-hoc routing protocols, Ad Hoc Networks, pp.795-819, 2005.

P. Papadimitratos and Z. Haas, Secure rotuing for mobile ad hoc networks, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.27-31, 2002.

B. Parno, A. Perrig, and V. D. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.49-63, 2005.
DOI : 10.1109/SP.2005.8

C. E. Perkins and P. Bhagwat, Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers, ACM SIGCOMM Computer Communication Review, vol.24, issue.4, pp.234-244, 1994.
DOI : 10.1145/190809.190336

A. Perrig, J. Stankovic, D. Wagner, and C. Rosenblatt, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004.
DOI : 10.1145/990680.990707

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001.
DOI : 10.1145/381677.381696

Y. Qian, K. Lu, and D. Tipper, Towards Survivable and Secure Wireless Sensor Networks, 2007 IEEE International Performance, Computing, and Communications Conference, pp.442-448, 2007.
DOI : 10.1109/PCCC.2007.358925

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.361.1210

J. M. Park, M. T. Refaei, R. Chen, M. Snow, and M. Eltoweissy, Defense against routing disruption attacks in mobile ad hoc networks, Proceedings of the Global Telecommunications Conference (GLOBECOM), 2006.

A. Rachedi, Contributions à la sécurité dans les réseaux mobiles Ad-hoc, 2008.

T. Roosta, S. Pai, P. Chen, S. Sastry, and S. B. Wicker, Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, pp.1273-1278, 2007.
DOI : 10.1109/GLOCOM.2007.245

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-royer, A secure routing protocol for ad hoc networks, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.78-89, 2002.
DOI : 10.1109/ICNP.2002.1181388

S. D. Servetto and G. Barrenechea, Constrained random walks on random graphs, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications , WSNA '02, pp.12-21, 2002.
DOI : 10.1145/570738.570741

J. P. Sterbenz, R. Krishnan, R. Hain, A. W. Jackson, D. Levin et al., Survivable mobile wireless networks, Proceedings of the ACM workshop on Wireless security , WiSE '02, pp.31-40, 2002.
DOI : 10.1145/570681.570685

P. Tague, M. Li, and R. Poovendran, Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Transactions on Mobile Computing, vol.8, issue.9, pp.1221-1234, 2009.
DOI : 10.1109/TMC.2009.33

P. Tague, S. Nabar, J. A. Ritcey, D. Slater, and R. Poovendran, Throughput optimization for multipath unicast routing under probabilistic jamming, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2008.
DOI : 10.1109/PIMRC.2008.4699741

P. Tague, D. Slater, J. Rogers, and R. Poovendran, Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis, IEEE Transactions on Dependable and Secure Computing, vol.6, issue.2, pp.111-123, 2009.
DOI : 10.1109/TDSC.2008.60

A. L. Toledo and X. Wang, Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.347-358, 2008.
DOI : 10.1109/TIFS.2008.926098

M. Tubaishat and J. Yin, A secure hierarchical model for sensor network, ACM SIGMOD Record, vol.33, issue.1, pp.7-13, 2004.
DOI : 10.1145/974121.974123

Y. S. Han, W. Du, J. Deng, and P. K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, IEEE Global Telecommunications Conference (GLOBECOM), pp.1435-1439, 2003.

D. Wagner, Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.78-87, 2004.
DOI : 10.1145/1029102.1029116

J. Paul-walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless sensor network security: A survey," in book chapter of security, Security in Distributed, Grid, Mobile, and Pervasive Computing, pp.0-849, 2007.

T. Watteyne, Energy-Efficient Self-Organization for Wireless Sensor Networks, 2008.

A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002.
DOI : 10.1109/MC.2002.1039518

A. D. Wood, J. A. Stankovic, and S. H. Son, JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp.286-297, 2003.
DOI : 10.1109/REAL.2003.1253275

K. Makki, X. Yen, N. Chen, and . Pissinou, Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, pp.52-73, 2009.

K. , Y. X. Chen, K. Makki, and N. Pissinou, Node compromise modeling and its applications in sensor networks, Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC), pp.575-582, 2007.

K. , Y. X. Chen, K. Makki, and N. Pissinou, Attack distribution modeling and its applications in sensor network security, EURASIP Journal on Wireless Communications and Networking, pp.1-11, 2008.

W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks: attack and defense strategies, IEEE Network, vol.20, issue.3, pp.41-47, 2006.

W. Xu, T. Wood, W. Trappe, and Y. Zhang, Channel surfing and spatial retreats, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.80-89, 2004.
DOI : 10.1145/1023646.1023661

A. Perrig, Y. Hu, and D. B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe), pp.30-40, 2003.

L. V. Hoesel, J. Doumen, P. Hartel, Y. W. Law, M. Palaniswami et al., Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, ACM Transactions on Sensor Networks, vol.5, issue.1, pp.1-38, 2009.

Y. Yang, X. Wang, S. Zhu, and G. Cao, Sdap: a secure hop-by-hop data aggregation protocol for sensor networks, Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.356-367, 2006.

F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical en-route filtering of injected false data in sensor networks, IEEE Journal on Selected Areas in Communications, vol.23, issue.4, pp.839-850, 2005.

Z. Yu and Y. Guan, A dynamic en-route scheme for filtering false data injection in wireless sensor networks, 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2006.

J. Zhen and S. Srinivas, Preventing Replay Attacks for Secure Routing in Ad Hoc Networks, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC- NOW), pp.140-150, 2003.
DOI : 10.1007/978-3-540-39611-6_13

Z. Zhu, Q. Tan, and P. Zhu, An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network, 10th Asia-Pacific Network Operations and Management Symposium, Managing Next Generation Networks and Services (APNOMS), pp.457-465, 2007.
DOI : 10.1007/978-3-540-75476-3_46

W. Znaidi and M. Minier, Proposition de gestion des clés et de contrôle d'accès dans un réseau de capteurs, 10ème Journées Doctorales Informatique et Réseau, pp.1-10, 2009.

W. Znaidi, M. Minier, and J. Babau, Detecting wormhole attacks in wireless networks using local neighborhood information, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2008.
DOI : 10.1109/PIMRC.2008.4699583

URL : https://hal.archives-ouvertes.fr/hal-00402737

W. Znaidi, M. Minier, and J. Babau, An ontology for attacks in wireless sensor networks, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00333591

I. Unité-de-recherche and I. Rhône, Alpes 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4

I. Unité-de-recherche and . Lorraine, Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004.

I. De-voluceau-rocquencourt, BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399