E. Miasnikov, Threat of terrorism using unmanned aerial vehicles: Technical aspects, 2005.

K. Hartmann and C. Steup, The vulnerability of uavs to cyber attacksan approach to the risk assessment, Cyber Conflict (CyCon), 2013 5th International Conference on, pp.1-23, 2013.

S. Chaumette, R. Laplace, C. Mazel, R. Mirault, A. Dunand et al., CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience, 2011, MILCOM 2011 Military Communications Conference, pp.2003-2010, 2011.
DOI : 10.1109/MILCOM.2011.6127613

S. Rosati, K. Kruzelecki, G. Heitz, D. Floreano, and B. Rimoldi, Dynamic Routing for Flying Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol.65, issue.3, 2014.
DOI : 10.1109/TVT.2015.2414819

K. Daniel, B. Dusza, A. Lewandowski, and C. Wietfeld, AirShield: A system-of-systems MUAV remote sensing architecture for disaster response, 2009 3rd Annual IEEE Systems Conference, pp.196-200, 2009.
DOI : 10.1109/SYSTEMS.2009.4815797

F. Bai and A. Helmy, A survey of mobility models, Wireless Adhoc Networks. University of Southern California, 2004.

O. Sahingoz, Mobile networking with UAVs: Opportunities and challenges, 2013 International Conference on Unmanned Aircraft Systems (ICUAS), pp.933-941, 2013.
DOI : 10.1109/ICUAS.2013.6564779

O. Bouachir, F. Garcia, A. Abrassart, and N. Larrieu, A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), 2014.
DOI : 10.1109/ICUAS.2014.6842277

URL : https://hal.archives-ouvertes.fr/hal-00998651

A. I. Alshbatat and L. Dong, Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas, International Journal of Aerospace Engineering, vol.6, issue.6, 2011.
DOI : 10.1049/el:20030337

O. K. Sahingoz, Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, Journal of Intelligent & Robotic Systems, vol.2869, issue.2003, pp.513-527, 2014.
DOI : 10.1007/s10846-013-9959-7

N. Butcher, A. Stewart, and S. Biaz, Securing the mavlink communication protocol for unmanned aircraft systems

Y. Shiu, S. Y. Chang, H. Wu, S. Huang, and H. Chen, Physical layer security in wireless networks: a tutorial, IEEE Wireless Communications, vol.18, issue.2, pp.66-74, 2011.
DOI : 10.1109/MWC.2011.5751298

S. Sen, J. A. Clark, and J. E. Tapiador, Security threats in mobile ad hoc networks Security of Self-Organizing Networks, pp.127-147, 2010.

D. R. Raymond and S. F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, IEEE Pervasive Computing, vol.7, issue.1, pp.74-81, 2008.
DOI : 10.1109/MPRV.2008.6

P. M. Jawandhiya, M. M. Ghonge, M. Ali, and J. Deshpande, A survey of mobile ad hoc network attacks, International Journal of Engineering Science and Technology, vol.2, issue.9, pp.4063-4071, 2010.

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, pp.103-135, 2007.
DOI : 10.1007/978-0-387-33112-6_5

L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. Chang, Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, IEEE Wireless Communications and Networking Conference, 2005, pp.1193-1199, 2005.
DOI : 10.1109/WCNC.2005.1424678

Y. Hu, A. Perrig, and D. B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.30-40, 2003.
DOI : 10.1145/941311.941317

F. Kandah, Y. Singh, and C. Wang, Colluding injected attack in mobile ad-hoc networks, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.235-240, 2011.
DOI : 10.1109/INFCOMW.2011.5928815

J. R. Douceur, The sybil attack, " in Peer-to-peer Systems, pp.251-260, 2002.

R. Maulik and N. Chaki, A study on wormhole attacks in manet, International Journal of Computer Information Systems and Industrial Management Applications ISSN, pp.2150-7988, 2011.

A. A. Hanafy, S. H. Noureldin, and M. A. Azer, Immunizing the saodv protocol against routing information disclosure, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.330-334, 2011.

L. Abusalah, A. Khokhar, and M. Guizani, A survey of secure mobile Ad Hoc routing protocols, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.78-93, 2008.
DOI : 10.1109/SURV.2008.080407

A. K. Pathan, W. Wsn, and V. , Security of self-organizing networks, 2010.
DOI : 10.1201/EBK1439819197

N. Larrieu, How can model driven development approaches improve the certification process for UAS?, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), 2014.
DOI : 10.1109/ICUAS.2014.6842263

URL : https://hal.archives-ouvertes.fr/hal-00977096

O. Pastor, S. España, J. I. Panach, and N. Aquino, Model-Driven Development, Informatik-Spektrum, vol.4, issue.1, pp.394-407, 2008.
DOI : 10.1007/s00287-008-0275-8

C. Perkins, E. Belding-royer, and S. Das, Rfc 3561-ad hoc on-demand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003.

P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum et al., Optimized link state routing protocol for ad hoc networks Technology for the 21st Century, Multi Topic Conference, pp.62-68, 2001.

B. Karp and H. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000.
DOI : 10.1145/345910.345953

R. Shirani, M. St-hilaire, T. Kunz, Y. Zhou, J. Li et al., Combined reactive-geographic routing for unmanned aeronautical adhoc networks, Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International, pp.820-826, 2012.

R. Shirani, M. St-hilaire, T. Kunz, Y. Zhou, J. Li et al., The Performance of Greedy Geographic Forwarding in Unmanned Aeronautical Ad-Hoc Networks, 2011 Ninth Annual Communication Networks and Services Research Conference, pp.2-5, 2011.
DOI : 10.1109/CNSR.2011.31

O. Modeler, Opnet technologies inc, 2009.

J. Maxa, G. Roudiere, and N. Larrieu, Emulation-based performance evaluation of routing protocols for uaanets, " in Communication Technologies for Vehicles -8th International Workshop, Nets4Cars/Nets4Trains, pp.227-240978, 2015.

D. B. Johnson, D. A. Maltz, Y. Hu, and J. Jetcheva, The dynamic source routing (dsr) protocol for mobile ad hoc networks, 2003.
DOI : 10.17487/rfc4728

G. Combs, Wireshark, pp.12-14, 2007.

S. Eichler and C. Roman, Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, pp.481-484, 2006.
DOI : 10.1109/MOBHOC.2006.278589

S. Lu, L. Li, K. Lam, and L. Jia, SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack, 2009 International Conference on Computational Intelligence and Security, pp.421-425, 2009.
DOI : 10.1109/CIS.2009.244

C. Boyd and A. Mathuria, Key establishment protocols for secure mobile communications: A selective survey, " in Information security and privacy, pp.344-355, 1998.

T. Zia, A. Zomaya, and N. Ababneh, Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), pp.181-185, 2007.
DOI : 10.1109/SENSORCOMM.2007.4394918

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003.
DOI : 10.1109/INFCOM.2003.1209219

A. Perrig and J. Tygar, TESLA Broadcast Authentication, Secure Broadcast Communication, pp.29-53, 2003.
DOI : 10.1007/978-1-4615-0229-6_3

Y. Moy, E. Ledinot, H. Delseny, V. Wiels, and B. Monate, Testing or Formal Verification: DO-178C Alternatives and Industrial Experience, IEEE Software, vol.30, issue.3, pp.50-57, 2013.
DOI : 10.1109/MS.2013.43

A. Bauer, Realtime capabilities of low-end powerpc and arm boards for embedded systems, Real-Time Linux Workshop, 2007.

R. S. Puttini, L. Me, R. T. De, and . Sousa, Certification and Authentication Services for Securing MANET Routing Protocols, Mobile and Wireless Communications Networks, 2003.
DOI : 10.1142/9789812791146_0060

M. A. Rahman, F. Anwar, and M. S. Azad, Integrated Metric-Ad Hoc On-Demand Distance Vector: A Routing Protocol over Wireless Mesh Networks, Journal of Computer Science, vol.5, issue.7, p.511, 2009.
DOI : 10.3844/jcssp.2009.511.518

N. Javaid, A. Javaid, I. A. Khan, and K. Djouani, Performance study of ETX based wireless routing metrics, 2009 2nd International Conference on Computer, Control and Communication, pp.1-7, 2009.
DOI : 10.1109/IC4.2009.4909163

S. Biaz, B. Qi, and Y. Ji, Improving Expected Transmission Time Metric in Multi-Rate Multi-Hop Networks, 2008 5th IEEE Consumer Communications and Networking Conference, pp.533-537, 2008.
DOI : 10.1109/ccnc08.2007.124

L. Ma and M. K. Denko, A Routing Metric for Load-Balancing in Wireless Mesh Networks, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.409-414, 2007.
DOI : 10.1109/AINAW.2007.50

S. Ghannay, S. M. Gammar, F. Filali, and F. Kamoun, Multi-radio multi-channel routing metrics in ieee 802.11 s-based wireless mesh networksand the winner is, Communications and Networking First International Conference on, pp.1-8, 2009.