[1] Y. Khenfouci and A. Badaoui, “Authentication Approach in Wireless Sensor Networks for the Pedagogy,” End of Studies Thesis in Computer Science, 2009.
[2] K. Beydoun, “Design of Hierarchical Routing Protocol for Wireless Sensor Network,” Ph.D. Thesis, UFR Des Sciences Et Techniques De L’Université De Franche-Comté, Besan?on, 2009.
[3] M. Bjorklund, “YANG—A Data Modeling Language for the Network Configuration Protocol (NETCONF),” Internet Engineering Task Force (IETF), Request for Comments: 6020, October 2010.
[4] R. Enns, M. Bjorklund, J. Schoenwaelder and A. Bierman, “NETCONF Configuration Protocol,” Network Working Group, Request for Comments: 6241, June 2011.
[5] M. Rose and K. McCloghrie, “Structure and Identification of Management Information for TCP/IP-based internets,” Request for Comments: 1155, May 1990.
[6] J. Schoenwaelder, “Common YANG Data Types,” RFC 6021, October 2010.
[7] http://www.netconfcentral.org/modules/ietf-inet-types
[8] C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Request for Comments: 3561, July 2003.
[9] T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik and J. P. Vasseur, “RPL: IPv6 Routing Protocol for Low power and Lossy Networks,” Draft-Ietf-Roll-Rpl-19, March 2011.
[10] J. Case, M. Fedor, M. Schoffstall and J. Davin, “A Simple Network Management Protocol (SNMP),” May 1990.
[11] K. McCloghrie and M. Rose, “Management Information Base for Network Management of TCP/IP-based internets,” Request for Comments: 1156, May 1990.
[12] K. Korte and A. Sehgal, “Definition of Managed Objects for the IPv6 Routing Protocol for Low power and Lossy Networks (RPL),” Draft-Sehgal-Roll-Rpl-Mib-00, October 2010.
[13] L. Lhotka, “A YANG Data Model for Routing Configuration,” Draft-Lhotka-Netmod-Routing-Cfg-00, March 2011.
[14] M. Bjorklund, “A YANG Data Model for Interface Configuration,” Draft-Ietf-Netmod-Interfaces-Cfg-01, May 2011.
[15] A. Bierman and M. Bjorklund, “YANG Data Model for System Management,” Draft-Bierman-Netmod-System-Mgmt-00, June 2011.
[16] J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” Wireless Communications, Vol. 11, No. 6, 2004, pp. 6-28.
[17] D. Benchaira and A. Bencheikh, “Security of the Data Dissemination in a Wireless Sensor Network: Case of Tiny Diffusion Protocol,” Master in Computer Science, Alger, 2009.
[18] S. K. Singh, M. P. Singh and D. K. Singh, “Routing Protocols in Wireless Sensor Networks—A Survey,” International Journal of Computer Science & Engineering Survey, Vol. 1, No. 2, 2010, pp. 63-83.
[19] S. Pal, D. Bhattacharyya, G. S. Tomar and T.-H. Kim, “Wireless Sensor Networks and Its Routing Protocols: A Comparative Study,” 2010 International Conference on Computational Intelligence and Communication Networks, Bhopal, 26-28 November 2010, pp. 314-319. doi:10.1109/CICN.2010.71
[20] A. Kemal and Y. Mohamed, “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Networks, Vol. 3, No. 3, 2005, pp. 325-349. doi:10.1016/j.adhoc.2003.09.010
[21] R. V. Biradar, V. C. Patil, S. R. Sawant and R. R. Mudholkar, “Classification and Comparison of Routing Protocols in Wireless Sensor Networks,” Ubiquitous Computing Security Systems, Vol. 4, Special Issue, 2009, pp. 704-711.
[22] N. Kushalnagar, G. Montenegro and C. Schumacher, “IPv6 over Low-Power Wireless Personal Area Networks (6Low-pans): Overview, Assumptions, Problem Statement, and Goals,” RFC 4919, August 2007.
[23] http://code.google.com/p/pyang/
[24] J. Schoenwaelder, “Common YANG Data Types,” Request for Comments: 6021, October 2010.
[25] J. P. Vasseur, M. Kim, K. Pister, N. Dejean and D. Barthel, “Routing Metrics Used for Path Calculation in Low Power and Lossy Networks,” Draft-Ietf-Roll-Routing-Metrics-19, March 2011.