K. Chaudhary and G. Shinde, Survey on group authentication in wireless sensor networks, 2015 International Conference on Pervasive Computing (ICPC), 2015.
DOI : 10.1109/PERVASIVE.2015.7087199

H. M. Ammari, The Art of Wireless Sensor Networks, 2013.

K. Singh and L. Sharma, Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks, International Journal of Computer Applications, vol.63, issue.4, 2013.
DOI : 10.5120/10457-5166

A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, Powertrace: Networklevel Power Profiling for Low-power Wireless Networks, pp.5-1100, 2011.

M. Koschuch, M. Hudler, M. Kruger, P. Lory, and J. Wenzel, Applicability of multiparty computation schemes for wireless sensor networks, Proceedings of the Data Communication Networking, 2010.

J. F. Li, D. W. Wei, and H. Z. Kou, Secure Monitoring Scheme Based on Identity-Based Threshold Signcryption for Wireless Sensor Networks, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008.
DOI : 10.1109/WiCom.2008.892

M. Sliti, M. Hamdi, and N. Boudriga, An elliptic threshold signature framework for k-security in wireless sensor networks, 2008 15th IEEE International Conference on Electronics, Circuits and Systems, 2008.
DOI : 10.1109/ICECS.2008.4674832

Y. L. Shen, Q. Q. Pei, and J. F. Ma, MMµTESLA: broadcast authentication protocol for multiple-base-station sensor networks, Chinese Journal of Computers, 2007.

F. B. Abdesslem, A. Ziviani, M. Dias-de-amorim, and P. Todorova, Looking Around First: Localized Potential-Based Clustering in Spontaneous Networks, IEEE Communications Letters, vol.11, issue.8, 2007.
DOI : 10.1109/LCOMM.2007.07466

URL : https://hal.archives-ouvertes.fr/hal-01151827

N. R. Prasad and M. Alam, Security Framework for Wireless Sensor Networks, Wireless Personal Communications, vol.38, issue.5, 2006.
DOI : 10.1007/s11277-006-9044-7

A. Dunkels, B. Gronvall, and T. Voigt, Contiki - a lightweight and flexible operating system for tiny networked sensors, 29th Annual IEEE International Conference on Local Computer Networks, 2004.
DOI : 10.1109/LCN.2004.38

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2002.
DOI : 10.1145/381677.381696

K. Mehdi, M. Lounis, A. Bounceur, and T. Kechadi, CupCarbon: A Multi-Agent and Discrete Event Wireless Sensor Network Design and Simulation Tool, Proceedings of the Seventh International Conference on Simulation Tools and Techniques, 2014.
DOI : 10.4108/icst.simutools.2014.254811

URL : https://hal.archives-ouvertes.fr/hal-00963926

A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, Third IEEE International Conference on Pervasive Computing and Communications, p.324328, 2005.
DOI : 10.1109/PERCOM.2005.18