I. F. Akyildiz and W. Xudong, A survey on wireless mesh networks, IEEE Communications Magazine, vol.43, issue.9, pp.23-30, 2005.
DOI : 10.1109/MCOM.2005.1509968

N. , B. Salem, and J. P. Hubaux, Securing wireless mesh networks, Wireless Communications, vol.13, pp.50-55, 2006.

K. Kane and J. C. Browne, Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks, Proceedings of the 5th ACM workshop on Wireless security , WiSe '06, pp.105-113, 2006.
DOI : 10.1145/1161289.1161308

H. Lin, J. Ma, J. Hu, and K. Yang, PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks, EURASIP Journal on Wireless Communications and Networking, vol.353, issue.6, pp.1-16, 2012.
DOI : 10.1007/978-0-585-29603-6_5

URL : https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-1499-2012-69?site=jwcn-eurasipjournals.springeropen.com

Y. N. Liu, K. Q. Li, Y. W. Jin, Y. Zhang, and W. Y. Qu, A novel reputation computation model based on subjective logic for mobile ad hoc networks Future Generation Computer Systems-the Figure 6. PDR performance under varying trust interval Figure 7. Routing overhead under varying trust interval, International Journal of Grid Computing and Escience, vol.27, pp.547-554, 2011.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

F. S. Proto, A. Detti, C. Pisa, and G. Bianchi, A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks, 2011 IEEE International Conference on Communications (ICC), pp.1-6, 2011.
DOI : 10.1109/icc.2011.5963001

D. M. Shila, C. Yu, and T. Anjali, Mitigating selective forwarding attacks with a channel-aware approach in WMNS, IEEE Transactions on Wireless Communications, vol.9, issue.5, pp.1661-1675, 2010.
DOI : 10.1109/TWC.2010.05.090700

Z. Zhang, P. Ho, and F. Naït-abdesselam, RADAR: A reputation-driven anomaly detection system for wireless mesh networks, Wireless Networks, vol.15, issue.1, pp.2221-2236, 2010.
DOI : 10.3233/JCS-2007-15102

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

A. L. Jøsang12-]-y, Y. Sun, H. Wei, K. J. Zhu, and . Liu, Artificial reasoning with subjective logicInformation theoretic framework of trust modeling and evaluation for ad hoc networks, Proceedings of the Second Australian Workshop on Commonsense Reasoning Selected Areas in Communications, pp.305-317, 1997.

S. Glass, M. Portmann, and V. Muthukkumarasamy, Securing Wireless Mesh Networks, IEEE Internet Computing, vol.12, issue.4, pp.30-36, 2008.
DOI : 10.1109/MIC.2008.85

J. Sen, Secure Routing in Wireless Mesh Networks, 2011.
DOI : 10.5772/13468

G. Shafer, A Mathematical Theory of Evidence, 1976.

S. Buchegger and J. Boudec, A robust reputation system for mobile ad-hoc networks, 2003.

S. Nahmias, Production and Operations Analysis NS-3 network simulator homepage, Available, vol.18, 2013.

P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum et al., Optimized link state routing protocol for ad hoc networks, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century., pp.62-68, 2001.
DOI : 10.1109/INMIC.2001.995315

URL : https://hal.archives-ouvertes.fr/inria-00471622