Broadcast control channel jamming: Resilience and identification of traitors, IEEE International Symposium on Information Theory (ISIT), pp.2496-2500, 2007. ,
Anonymous Routing for Mobile Wireless Ad Hoc Networks, International Journal of Distributed Sensor Networks, vol.24, issue.2, pp.105-117, 2007. ,
DOI : 10.1080/15501320601069846
Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002. ,
DOI : 10.1016/S1389-1286(01)00302-4
Diversify sensor nodes to improve resilience against node compromise, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.101-112, 2006. ,
DOI : 10.1145/1180345.1180359
Secure data aggregation in wireless sensor network: a survey, Proceedings of the 6th Australasian Information Security Conference (AISC), pp.93-105, 2008. ,
Report from the IAB workshop on Unwanted Traffic, RFC, vol.4948, 2006. ,
Robust key generation from signal envelopes in wireless networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.401-410, 2007. ,
DOI : 10.1145/1315245.1315295
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, Sicherheit -Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), pp.26-29, 2006. ,
DOI : 10.1007/11734666_9
A performance comparison of wireless ad hoc network routing protocols under security attack, Proceedings of the 3d International Symposium on Information Assurance and Security (IAS), pp.50-55, 2007. ,
Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions Sensor Networks, vol.5, issue.3, pp.1-36, 2009. ,
Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy (S&P ), p.197, 2003. ,
Secure hierarchical in-network aggregation in sensor networks, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.278-287, 2006. ,
DOI : 10.1145/1180405.1180440
Network survivability performance evaluation:, Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems , MSWiM '02, pp.61-68, 2002. ,
DOI : 10.1145/570758.570769
Cross-layer jamming detection and mitigation in wireless broadcast networks, Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (MO- BICOM), pp.346-349, 2007. ,
A framework of survivability model for wireless sensor network, Proceedings of the The 1st International Conference on Availability, Reliability and Security (ARES), pp.515-522, 2006. ,
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation, IEEE Transactions on Mobile Computing, vol.5, issue.10, pp.1417-1431, 2006. ,
Internet Security: An Intrusion-Tolerance Approach, Proceedings of the IEEE ISSN, pp.432-473, 2006. ,
DOI : 10.1109/JPROC.2005.862320
A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys & Tutorials, vol.7, issue.4, pp.2-28, 2005. ,
DOI : 10.1109/COMST.2005.1593277
A Provably Secure Additive and Multiplicative Privacy Homomorphism*, 5th International Conference on Information Security (ISC), pp.471-483, 2002. ,
DOI : 10.1007/3-540-45811-5_37
Survivable network system analysis: a case study, IEEE Software, vol.16, issue.4, pp.70-77, 1999. ,
DOI : 10.1109/52.776952
Highly-resilient, energy-efficient multipath routing in wireless sensor networks, Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.251-254, 2001. ,
SIA, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.69-102, 2007. ,
DOI : 10.1145/958491.958521
Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation, pp.127-134, 2008. ,
DOI : 10.1109/PADS.2008.12
URL : https://hal.archives-ouvertes.fr/inria-00384134
Secure aggregation for wireless network, Symposium on Applications and the Internet Workshops (SAINT), pp.384-394, 2003. ,
Using directional antennas to prevent wormhole attacks, Proceedings of the Network and Distributed System Security Symposium (NDSS), pp.1-11, 2004. ,
Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003. ,
DOI : 10.1109/INFCOM.2003.1209219
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005. ,
DOI : 10.1145/570645.570648
Attack Analysis and Detection for Ad Hoc Routing Protocols, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), pp.125-145, 2004. ,
DOI : 10.1007/978-3-540-30143-1_7
Mitigating attacks against virtual coordinate based routing in wireless sensor networks, Proceedings of the 1st ACM Conference on Wireless Network Security (WISEC), pp.89-99, 2008. ,
Trust Management for Resilient Wireless Sensor Networks, 8th International Conference on Information Security and Cryptology (ICISC), pp.56-68, 2005. ,
DOI : 10.1007/11734727_7
Exploiting heterogeneity for sensor network security, Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.591-593, 2008. ,
Efficient Secure Aggregation in Sensor Networks, 11th International Conference on High Performance Computing (HiPC), pp.40-49, 2004. ,
DOI : 10.1007/978-3-540-30474-6_10
Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, pp.153-181, 1996. ,
DOI : 10.1007/978-0-585-29603-6_5
Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, pp.293-315, 2003. ,
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000. ,
DOI : 10.1145/345910.345953
A Resilient Multipath Routing Protocol for Wireless Sensor Networks, 4th International Conference on Networking (ICN), pp.1122-1129, 2005. ,
DOI : 10.1007/978-3-540-31957-3_128
A quantitative survivability evaluation model for wireless sensor networks, IEEE International Conference on Networking, Sensing and Control, pp.727-732, 2006. ,
A survey of survivability in mobile ad hoc networks, IEEE Communications Surveys & Tutorials, vol.11, issue.1, pp.1-3, 2009. ,
DOI : 10.1109/SURV.2009.090106
URL : https://hal.archives-ouvertes.fr/hal-01168681
Survival multipath routing for MANETs, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.425-432, 2008. ,
DOI : 10.1109/NOMS.2008.4575164
URL : https://hal.archives-ouvertes.fr/hal-01303595
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks, Proceedings of the 1st ACM Conference on Wireless Network Security (WISEC), pp.214-219, 2008. ,
SecureDAV: a secure data aggregation and verification protocol for sensor networks, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.2175-2179, 2004. ,
DOI : 10.1109/GLOCOM.2004.1378395
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.8423
Energy efficient routing in wireless sensor networks, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.357-361, 2001. ,
DOI : 10.1109/MILCOM.2001.985819
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000. ,
DOI : 10.1145/345910.345955
Active detection of node replication attacks, International Journal of Computer Science and Network Security (IJCSNS), vol.9, pp.13-21, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00464634
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, 6th Joint Working Conference on Communications and Multimedia Security, Advanced Communications and Multimedia Security, pp.107-121, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
Security in Ad Hoc Networks, 8th International Conference on Personal Wireless Communications (PWC), pp.756-775, 2003. ,
DOI : 10.1007/978-3-540-39867-7_69
Secure verification of location claims, Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe), pp.1-10, 2003. ,
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004. ,
DOI : 10.1145/984622.984660
How to misuse aodv: a case study of insider attacks against mobile ad-hoc routing protocols, Ad Hoc Networks, pp.795-819, 2005. ,
Secure rotuing for mobile ad hoc networks, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.27-31, 2002. ,
Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.49-63, 2005. ,
DOI : 10.1109/SP.2005.8
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers, ACM SIGCOMM Computer Communication Review, vol.24, issue.4, pp.234-244, 1994. ,
DOI : 10.1145/190809.190336
Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004. ,
DOI : 10.1145/990680.990707
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001. ,
DOI : 10.1145/381677.381696
Towards Survivable and Secure Wireless Sensor Networks, 2007 IEEE International Performance, Computing, and Communications Conference, pp.442-448, 2007. ,
DOI : 10.1109/PCCC.2007.358925
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.361.1210
Defense against routing disruption attacks in mobile ad hoc networks, Proceedings of the Global Telecommunications Conference (GLOBECOM), 2006. ,
Contributions à la sécurité dans les réseaux mobiles Ad-hoc, 2008. ,
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, pp.1273-1278, 2007. ,
DOI : 10.1109/GLOCOM.2007.245
A secure routing protocol for ad hoc networks, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.78-89, 2002. ,
DOI : 10.1109/ICNP.2002.1181388
Constrained random walks on random graphs, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications , WSNA '02, pp.12-21, 2002. ,
DOI : 10.1145/570738.570741
Survivable mobile wireless networks, Proceedings of the ACM workshop on Wireless security , WiSE '02, pp.31-40, 2002. ,
DOI : 10.1145/570681.570685
Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Transactions on Mobile Computing, vol.8, issue.9, pp.1221-1234, 2009. ,
DOI : 10.1109/TMC.2009.33
Throughput optimization for multipath unicast routing under probabilistic jamming, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2008. ,
DOI : 10.1109/PIMRC.2008.4699741
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis, IEEE Transactions on Dependable and Secure Computing, vol.6, issue.2, pp.111-123, 2009. ,
DOI : 10.1109/TDSC.2008.60
Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.347-358, 2008. ,
DOI : 10.1109/TIFS.2008.926098
A secure hierarchical model for sensor network, ACM SIGMOD Record, vol.33, issue.1, pp.7-13, 2004. ,
DOI : 10.1145/974121.974123
A witness-based approach for data fusion assurance in wireless sensor networks, IEEE Global Telecommunications Conference (GLOBECOM), pp.1435-1439, 2003. ,
Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.78-87, 2004. ,
DOI : 10.1145/1029102.1029116
Wireless sensor network security: A survey," in book chapter of security, Security in Distributed, Grid, Mobile, and Pervasive Computing, pp.0-849, 2007. ,
Energy-Efficient Self-Organization for Wireless Sensor Networks, 2008. ,
Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002. ,
DOI : 10.1109/MC.2002.1039518
JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp.286-297, 2003. ,
DOI : 10.1109/REAL.2003.1253275
Sensor network security: a survey, IEEE Communications Surveys & Tutorials, vol.11, issue.2, pp.52-73, 2009. ,
Node compromise modeling and its applications in sensor networks, Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC), pp.575-582, 2007. ,
Attack distribution modeling and its applications in sensor network security, EURASIP Journal on Wireless Communications and Networking, pp.1-11, 2008. ,
Jamming sensor networks: attack and defense strategies, IEEE Network, vol.20, issue.3, pp.41-47, 2006. ,
Channel surfing and spatial retreats, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.80-89, 2004. ,
DOI : 10.1145/1023646.1023661
Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe), pp.30-40, 2003. ,
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, ACM Transactions on Sensor Networks, vol.5, issue.1, pp.1-38, 2009. ,
Sdap: a secure hop-by-hop data aggregation protocol for sensor networks, Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.356-367, 2006. ,
Statistical en-route filtering of injected false data in sensor networks, IEEE Journal on Selected Areas in Communications, vol.23, issue.4, pp.839-850, 2005. ,
A dynamic en-route scheme for filtering false data injection in wireless sensor networks, 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2006. ,
Preventing Replay Attacks for Secure Routing in Ad Hoc Networks, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC- NOW), pp.140-150, 2003. ,
DOI : 10.1007/978-3-540-39611-6_13
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network, 10th Asia-Pacific Network Operations and Management Symposium, Managing Next Generation Networks and Services (APNOMS), pp.457-465, 2007. ,
DOI : 10.1007/978-3-540-75476-3_46
Proposition de gestion des clés et de contrôle d'accès dans un réseau de capteurs, 10ème Journées Doctorales Informatique et Réseau, pp.1-10, 2009. ,
Detecting wormhole attacks in wireless networks using local neighborhood information, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2008. ,
DOI : 10.1109/PIMRC.2008.4699583
URL : https://hal.archives-ouvertes.fr/hal-00402737
An ontology for attacks in wireless sensor networks, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00333591
Alpes 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4 ,
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004. ,
BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399 ,