M. Al-shurman, S. Yoo, and S. Park, Black hole attack in mobile Ad Hoc networks, Proceedings of the 42nd annual Southeast regional conference on , ACM-SE 42, pp.96-97, 2004.
DOI : 10.1145/986537.986560

A. Moreno-ambrosin, M. Compagno, C. Conti, G. Ghali, and . Tsudik, Security and Privacy Analysis of NSF Future Internet Architectures, 2016.

J. Augé, G. Carofiglio, G. Grassi, L. Muscariello, G. Pau et al., MAP-Me: Managing Anchor-less Producer Mobility in Information-Centric Networks. arXiv preprint, 2016.

A. Azgin, R. Ravindran, and G. Wang, A scalable mobility-centric architecture for named data networking. arXiv preprint arXiv:1406, p.7049, 2014.

H. Ballani, P. Francis, and X. Zhang, A study of prefix hijacking and interception in the internet, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.265-276, 2007.
DOI : 10.1145/1282427.1282411

D. Bhasker, 4G LTE security for mobile network operators, Cyber Security and Information Systems, vol.1, issue.4, pp.20-29, 2013.

K. Butler, T. R. Farley, P. Mcdaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE 98, pp.100-122, 2010.
DOI : 10.1109/JPROC.2009.2034031

T. Andrew, J. Campbell, S. Gomez, A. G. Kim, C. Valkó et al., Design, implementation, and evaluation of cellular IP, IEEE Personal Communications, vol.7, issue.4, pp.42-49, 2000.

J. Cichonski, J. M. Franklin, and M. Bartock, Guide to LTE Security, DRAFT NIST Special Publication, pp.800-187, 2016.
DOI : 10.6028/NIST.SP.800-187

M. Conti, P. Gasti, and M. Teoli, A lightweight mechanism for detection of cache pollution attacks in Named Data Networking, Computer Networks, vol.57, issue.16, pp.3178-3191, 2013.
DOI : 10.1016/j.comnet.2013.07.034

D. Coppersmith and M. Jakobsson, Almost Optimal Hash Sequence Traversal, International Conference on Financial Cryptography, pp.102-119, 2002.
DOI : 10.1007/3-540-36504-4_8

URL : http://www.informatics.indiana.edu/markus/papers/AOhash.ps

S. Das, A. Misra, and P. Agrawal, TeleMIP: telecommunications-enhanced mobile IP architecture for fast intradomain mobility, IEEE Personal Communications, vol.7, issue.4, pp.50-58, 2000.
DOI : 10.1109/98.863996

C. Ghali, M. A. Schlosberg, G. Tsudik, and C. A. Wood, Interest-Based Access Control for Content Centric Networks, Proceedings of the 2nd International Conference on Information-Centric Networking, ICN '15, pp.147-156, 2015.
DOI : 10.1109/INFCOM.2010.5462174

URL : http://arxiv.org/pdf/1505.06258

C. Ghali, G. Tsudik, and E. Uzun, Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014.
DOI : 10.14722/sent.2014.23014

D. Han, M. Lee, K. Cho, T. Kwon, and Y. Choi, Publisher mobility support in content centric networks, International Conference on Information Networking (ICOIN). IEEE, pp.214-219, 2014.

F. Hermans, E. Ngai, and P. Gunningberg, Global source mobility in the content-centric networking architecture, Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design, Architecture, Algorithms, and Applications, NoM '12, pp.13-18, 2012.
DOI : 10.1145/2248361.2248366

G. Huston, M. Rossi, and G. Armitage, Securing BGP ??? A Literature Survey, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.199-222, 2011.
DOI : 10.1109/SURV.2011.041010.00041

S. Kent, C. Lynn, and K. Seo, Secure Border Gateway Protocol (S-BGP), IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.582-592, 2000.
DOI : 10.1109/49.839934

URL : http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/045.pdf

D. Kim, J. Kim, Y. Kim, H. Yoon, and I. Yeom, Mobility support in content centric networks, Proceedings of the second edition of the ICN workshop on Information-centric networking, ICN '12, pp.13-18, 2012.
DOI : 10.1145/2342488.2342492

URL : http://conferences.sigcomm.org/sigcomm/2012/paper/icn/p13.pdf

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

URL : http://www.cs.utk.edu/~dunigan/cs594-cns00/lamport.pdf

J. Lee, S. Cho, and D. Kim, Device mobility management in content-centric networking, IEEE Communications Magazine, vol.50, issue.12, pp.28-34, 2012.
DOI : 10.1109/MCOM.2012.6384448

D. Li and M. Choo-cuah, SCOM: A Scalable Content Centric Network Architecture with Mobility Support, 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, pp.25-32, 2013.
DOI : 10.1109/MSN.2013.44

S. Murphy and M. Badger, OSPF with digital signatures. RFC 2154, 1997.
DOI : 10.17487/rfc2154

M. Naor and K. Nissim, Certificate revocation and certificate update, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.561-570, 2000.
DOI : 10.1109/49.839932

URL : http://www.sagecertification.org/publications/library/proceedings/sec98/full_papers/nissim/nissim.pdf

B. Preneel, Cryptographic hash functions, European Transactions on Telecommunications, vol.3, issue.5, pp.431-448, 1994.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

C. Paul, T. Van-oorschot, E. Wan, and . Kranakis, On interdomain routing security and pretty secure BGP (psBGP), ACM Transactions on Information and System Security, vol.10, pp.3-11, 2007.

T. Wan, E. Kranakis, and P. C. Van-oorschot, S-RIP: A Secure Distance Vector Routing Protocol, Applied Cryptography and Network Security (ACNS, pp.103-119, 2004.
DOI : 10.1007/978-3-540-24852-1_8

URL : http://www.scs.carleton.ca/~canccom/Publications/tao-srip.pdf

L. Wang, O. Waltari, and J. Kangasharju, MobiCCN: Mobility support with greedy routing in Content-Centric Networks, 2013 IEEE Global Communications Conference (GLOBECOM), pp.2069-2075, 2013.
DOI : 10.1109/GLOCOM.2013.6831380

R. White, Securing BGP through secure origin BGP (soBGP), Business Communications Review, vol.33, issue.5, pp.47-53, 2003.

L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Crowley et al., Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014.
DOI : 10.1145/2656877.2656887

URL : https://hal.archives-ouvertes.fr/hal-01182997

Y. Zhang, A. Afanasyev, J. Burke, and L. Zhang, A survey of mobility support in Named Data Networking, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.83-88, 2016.
DOI : 10.1109/INFCOMW.2016.7562050

Y. Zhang, H. Zhang, and L. Zhang, Kite, Proceedings of the 1st international conference on Information-centric networking, INC '14, pp.179-180, 2014.
DOI : 10.1145/2660129.2660159