Threat of terrorism using unmanned aerial vehicles: Technical aspects, 2005. ,
The vulnerability of uavs to cyber attacksan approach to the risk assessment, Cyber Conflict (CyCon), 2013 5th International Conference on, pp.1-23, 2013. ,
CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience, 2011, MILCOM 2011 Military Communications Conference, pp.2003-2010, 2011. ,
DOI : 10.1109/MILCOM.2011.6127613
Dynamic Routing for Flying Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol.65, issue.3, 2014. ,
DOI : 10.1109/TVT.2015.2414819
AirShield: A system-of-systems MUAV remote sensing architecture for disaster response, 2009 3rd Annual IEEE Systems Conference, pp.196-200, 2009. ,
DOI : 10.1109/SYSTEMS.2009.4815797
A survey of mobility models, Wireless Adhoc Networks. University of Southern California, 2004. ,
Mobile networking with UAVs: Opportunities and challenges, 2013 International Conference on Unmanned Aircraft Systems (ICUAS), pp.933-941, 2013. ,
DOI : 10.1109/ICUAS.2013.6564779
A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), 2014. ,
DOI : 10.1109/ICUAS.2014.6842277
URL : https://hal.archives-ouvertes.fr/hal-00998651
Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas, International Journal of Aerospace Engineering, vol.6, issue.6, 2011. ,
DOI : 10.1049/el:20030337
Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, Journal of Intelligent & Robotic Systems, vol.2869, issue.2003, pp.513-527, 2014. ,
DOI : 10.1007/s10846-013-9959-7
Securing the mavlink communication protocol for unmanned aircraft systems ,
Physical layer security in wireless networks: a tutorial, IEEE Wireless Communications, vol.18, issue.2, pp.66-74, 2011. ,
DOI : 10.1109/MWC.2011.5751298
Security threats in mobile ad hoc networks Security of Self-Organizing Networks, pp.127-147, 2010. ,
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, IEEE Pervasive Computing, vol.7, issue.1, pp.74-81, 2008. ,
DOI : 10.1109/MPRV.2008.6
A survey of mobile ad hoc network attacks, International Journal of Engineering Science and Technology, vol.2, issue.9, pp.4063-4071, 2010. ,
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, pp.103-135, 2007. ,
DOI : 10.1007/978-0-387-33112-6_5
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, IEEE Wireless Communications and Networking Conference, 2005, pp.1193-1199, 2005. ,
DOI : 10.1109/WCNC.2005.1424678
Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.30-40, 2003. ,
DOI : 10.1145/941311.941317
Colluding injected attack in mobile ad-hoc networks, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.235-240, 2011. ,
DOI : 10.1109/INFCOMW.2011.5928815
The sybil attack, " in Peer-to-peer Systems, pp.251-260, 2002. ,
A study on wormhole attacks in manet, International Journal of Computer Information Systems and Industrial Management Applications ISSN, pp.2150-7988, 2011. ,
Immunizing the saodv protocol against routing information disclosure, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.330-334, 2011. ,
A survey of secure mobile Ad Hoc routing protocols, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.78-93, 2008. ,
DOI : 10.1109/SURV.2008.080407
Security of self-organizing networks, 2010. ,
DOI : 10.1201/EBK1439819197
How can model driven development approaches improve the certification process for UAS?, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), 2014. ,
DOI : 10.1109/ICUAS.2014.6842263
URL : https://hal.archives-ouvertes.fr/hal-00977096
Model-Driven Development, Informatik-Spektrum, vol.4, issue.1, pp.394-407, 2008. ,
DOI : 10.1007/s00287-008-0275-8
Rfc 3561-ad hoc on-demand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003. ,
Optimized link state routing protocol for ad hoc networks Technology for the 21st Century, Multi Topic Conference, pp.62-68, 2001. ,
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000. ,
DOI : 10.1145/345910.345953
Combined reactive-geographic routing for unmanned aeronautical adhoc networks, Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International, pp.820-826, 2012. ,
The Performance of Greedy Geographic Forwarding in Unmanned Aeronautical Ad-Hoc Networks, 2011 Ninth Annual Communication Networks and Services Research Conference, pp.2-5, 2011. ,
DOI : 10.1109/CNSR.2011.31
Opnet technologies inc, 2009. ,
Emulation-based performance evaluation of routing protocols for uaanets, " in Communication Technologies for Vehicles -8th International Workshop, Nets4Cars/Nets4Trains, pp.227-240978, 2015. ,
The dynamic source routing (dsr) protocol for mobile ad hoc networks, 2003. ,
DOI : 10.17487/rfc4728
Wireshark, pp.12-14, 2007. ,
Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, pp.481-484, 2006. ,
DOI : 10.1109/MOBHOC.2006.278589
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack, 2009 International Conference on Computational Intelligence and Security, pp.421-425, 2009. ,
DOI : 10.1109/CIS.2009.244
Key establishment protocols for secure mobile communications: A selective survey, " in Information security and privacy, pp.344-355, 1998. ,
Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), pp.181-185, 2007. ,
DOI : 10.1109/SENSORCOMM.2007.4394918
Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003. ,
DOI : 10.1109/INFCOM.2003.1209219
TESLA Broadcast Authentication, Secure Broadcast Communication, pp.29-53, 2003. ,
DOI : 10.1007/978-1-4615-0229-6_3
Testing or Formal Verification: DO-178C Alternatives and Industrial Experience, IEEE Software, vol.30, issue.3, pp.50-57, 2013. ,
DOI : 10.1109/MS.2013.43
Realtime capabilities of low-end powerpc and arm boards for embedded systems, Real-Time Linux Workshop, 2007. ,
Certification and Authentication Services for Securing MANET Routing Protocols, Mobile and Wireless Communications Networks, 2003. ,
DOI : 10.1142/9789812791146_0060
Integrated Metric-Ad Hoc On-Demand Distance Vector: A Routing Protocol over Wireless Mesh Networks, Journal of Computer Science, vol.5, issue.7, p.511, 2009. ,
DOI : 10.3844/jcssp.2009.511.518
Performance study of ETX based wireless routing metrics, 2009 2nd International Conference on Computer, Control and Communication, pp.1-7, 2009. ,
DOI : 10.1109/IC4.2009.4909163
Improving Expected Transmission Time Metric in Multi-Rate Multi-Hop Networks, 2008 5th IEEE Consumer Communications and Networking Conference, pp.533-537, 2008. ,
DOI : 10.1109/ccnc08.2007.124
A Routing Metric for Load-Balancing in Wireless Mesh Networks, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.409-414, 2007. ,
DOI : 10.1109/AINAW.2007.50
Multi-radio multi-channel routing metrics in ieee 802.11 s-based wireless mesh networksand the winner is, Communications and Networking First International Conference on, pp.1-8, 2009. ,