Akyildiz I. F. Su W., Sankarasubramaniam Y. et Cayirci E. "Wireless sensor networks: a survey", Computer Networks. Vol. 38(4). - pp. 393-422, 2002
Boukerche A. Werner Nelem Pazzia R., Borges Araujo R. "Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments"; Journal of Parallel and Distributed Computing, Avr 2006. - 4 : Vol. 66. - pp. 586-599.
Boukerche A., Chatzigiannakisb I., Nikoletseas S. "A new energy efficient and fault-tolerant protocol for data propagation in smart dust networks using varying transmission range, 2006. - Vol. 29. - pp. 477-489.
Claude Castelluccia, Einar Mykletun, and Gene Tsudik. "Efficient aggregation of encrypted data in wireless sensor networks". In MobiQuitous, pages 109-117. 2005.
Yong Yao and J. E. Gehrke. The Cougar Approach to In-Network Query Processing in Sensor Networks. Sigmod Record, Volume 31, Number 3, September 2002.
http://www.xbow.com/
C. Intanagonwiwat and R. Govindan and D. Estrin, "Directed Diffusion : a Scalable and Robust Communication Paradigm for Sensor Networks", ACM MobiCom 2000, Boston, MA (2000).
D. J. Malan, M. Welsh, and M. D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography", Proc. 1st IEEE Int'l.Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004.
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks", In Proceedings of the 9th ACM conference on Computer and communications security, November 2002.
J. Deng, R. Han, and S. Mishra, "Insens : intrusion-Tolerant Routing for Wireless Sensor Networks", Computer Communications 29 (2006), no. 2, 216–230.
Daia F., Wub J. "On constructing k-connected k-dominating set in wireless ad hoc and sensor networks"; J. Parallel Distrib. Comput., 2006. - Vol. 66. - pp. 947 – 958.
S. Zhu, S. Setia, and S. Jajodia, "Leap : efficient security mechanisms for large-scale distributed sensor networks", CCS 03 : Proceedings of the 10th ACM conference on Computer and communications security (New York, NY, USA), ACM Press, 2003, pp. 62–72.
F. Ye et al., "A Scalable Solution to Minimum Cost Forwarding in Large Sensor Networks", 10th Int. Conf. Comp. Commun. and Networks (2001), 304–309.
David Gay, Philip Levis, david Culler, Eric Brewer ; "nesC 1.1 Language Reference Manual".
S. Lindsey and C. Raghavendra, "PEGASIS : Power-efficient gathering in sensor information systems," in Proceedings of IEEE Aerospace Conference, vol. 3, March 2002, pp. 1125-1130.
Josep Domingo-Ferrer. "A provably secure additive and multiplicative privacy homomorphism". In ISC '02 : Proceedings of the 5th International Conference on Information Security, 2002.
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks", In IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197{213.
Kemal Akkaya , Mohamed Younis "A survey on routing protocols for wireless sensor networks" Ad Hoc Networks 3,2005.
D. Braginsky and D. Estrin, "Rumor Routing Algorithm for Sensor Networks", 1st Workshop. Sensor Networks and Apps., Atlanta, GA (2002).
L.Hu and D. Evans, "Secure aggregation for wireless networks",Workshop on Security and Assurance in Ad Hoc Networks, January 2003.
J. Yin and S. Madria, "Secrout : A secure routing protocol for sensor networks", AINA 06 : Proceedings of the 20th International Conference on Advanced Information Networking and Applications (Washington, DC, USA), vol. 1, 2006, pp. 393–398.
Chris Karlof, David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures"; Ad Hoc Networks Vol.1 (2003) pp. 293–315.
Mahimkar A et Rappaport, T.S, SecureDAV : A Secure Data Aggregation and Verication Protocol for Sensor Networks, 2004.
M.Bagaa, N. Lasla, A. Ouadjaout and Y.Challal ; "SEDAN : Secure and Efficient protocol for Data Aggregation in wireless sensor Networks", 32nd IEEE Conference on Local Computer Networks (LCN 2007) pp. 1053-1060, Worksohop on Netwok Security.
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins : Security Protocols for Sensor Networks", Wirel. Netw. 8 (2002), no. 5, 521–534.
Y.wang, G.Attebury and B.Ramamurty, "A survey of security issues in wireless sensor networks", in IEEE Communication Survey Tutorials, 2006.
A. Manjeshwar and D. P. Agrawal, "Teen : Arouting protocol for enhanced efficiency in wireless sensor networks", the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001, p. 189.
http://www.tinyos.net
C. Karlof, N. Sastry, and D. Wagner, "Tinysec : A link layer security architecture for wireless sensor networks," in Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004.
Philip Levis and Nelson Lee, "TOSSIM: A Simulator for TinyOS Networks"
http://www.zigbee.org