I. Bekmezci, O. K. Sahingoz, and ?. Temel, Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013.
DOI : 10.1016/j.adhoc.2012.12.004

R. Maulik and N. Chaki, A study on wormhole attacks in manet, International Journal of Computer Information Systems and Industrial Management Applications ISSN, pp.2150-7988, 2011.

M. G. Zapata, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002.
DOI : 10.1145/581291.581312

E. Coder, Generate c and c++ code optimized for embedded systems, 2014 the mathworks

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

J. Maxa, M. Slim-ben-mahmoud, and N. Larrieu, Secure routing protocol design for uav ad hoc networks, Digital Avionics Systems Conference (DASC), pp.4-5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01166852

J. Maxa, G. Roudiere, and N. Larrieu, Emulation-Based Performance Evaluation of Routing Protocols for Uaanets, Communication Technologies for Vehicles, pp.227-240, 2015.
DOI : 10.1007/978-3-319-17765-6_20

URL : https://hal.archives-ouvertes.fr/hal-01132516

C. Perkins, E. Belding-royer, and S. Das, Rfc 3561-ad hoc ondemand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003.

E. Pastor, J. Lopez, and P. Royo, UAV Payload and Mission Control Hardware/Software Architecture, IEEE Aerospace and Electronic Systems Magazine, vol.22, issue.6, pp.3-8, 2007.
DOI : 10.1109/MAES.2007.384074

J. Li, Y. Zhou, and L. Lamont, Communication architectures and protocols for networking unmanned aerial vehicles, Globecom Workshops (GC Wkshps), pp.1415-1420, 2013.

K. Daniel, B. Dusza, A. Lewandowski, and C. Wietfeld, AirShield: A system-of-systems MUAV remote sensing architecture for disaster response, 2009 3rd Annual IEEE Systems Conference, pp.196-200, 2009.
DOI : 10.1109/SYSTEMS.2009.4815797

P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum et al., Optimized link state routing protocol for ad hoc networks Technology for the 21st Century, Multi Topic Conference, pp.62-68, 2001.

D. B. Johnson, D. A. Maltz, Y. Hu, and J. Jetcheva, The dynamic source routing (dsr) protocol for mobile ad hoc networks, 2003.
DOI : 10.17487/rfc4728

A. Maghsoudlou, M. St-hilaire, and T. Kunz, A survey on geographic routing protocols for mobile ad hoc networks, 2011.

M. Hyland, B. E. Mullins, R. O. Baldwin, and M. A. Temple, Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.249-256, 2007.
DOI : 10.1109/AINAW.2007.336

J. Maxa, M. B. Mahmoud, and N. Larrieu, Joint Model-Driven design and real experiment-based validation for a secure UAV Ad hoc Network routing protocol, 2016 Integrated Communications Navigation and Surveillance (ICNS), 2016.
DOI : 10.1109/ICNSURV.2016.7486324

URL : https://hal.archives-ouvertes.fr/hal-01292300

T. Bhattasali, R. Chaki, S. Sanyal, K. Sanzgiri, D. Laflamme et al., Sleep deprivation attack detection in wireless sensor network arXiv preprint arXiv:1203.0231 Authenticated routing for ad hoc networks, Selected Areas in Communications, pp.598-610, 2005.

Q. Li, M. Zhao, J. Walker, Y. Hu, A. Perrig et al., SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.325-340, 2009.
DOI : 10.1145/1368310.1368339

M. Mohammadizadeh, A. Movaghar, and S. M. Safi, SEAODV, Proceedings of the 2nd International Conference on Interaction Sciences Information Technology, Culture and Human, ICIS '09, pp.940-944, 2009.
DOI : 10.1145/1655925.1656096

J. Cordasco and S. Wetzel, An attacker model for MANET routing security, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.87-94, 2009.
DOI : 10.1145/1514274.1514288

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003.
DOI : 10.1109/INFCOM.2003.1209219

T. Polk, L. Chen, S. Turner, and P. Hoffman, Security considerations for the sha-0 and sha-1 message-digest algorithms, 2011.
DOI : 10.17487/rfc6194

N. Larrieu and A. Varet, Methodology for Rapid Prototyping Avionic Software, Rapid Prototyping of Software for Avionics Systems, pp.23-60
DOI : 10.1002/9781119050643.ch2

C. M. Holloway, Towards understanding the DO-178C / ED-12C assurance case, 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012, 2012.
DOI : 10.1049/cp.2012.1499

L. Rierson, Developing safety-critical software: a practical guide for aviation software and DO-178C compliance, 2013.

G. Gigante and D. Pascarella, Formal Methods in Avionic Software Certification: The DO-178C Perspective, International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, pp.205-215, 2012.
DOI : 10.1007/978-3-642-34032-1_21

C. Perkins, E. Belding-royer, and S. Das, Ad hoc on-demand distance vector (aodv) routing, 2003.
DOI : 10.17487/rfc3561

I. Cervesato, The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001.

V. Oracle, Virtualbox, 2013.

R. Gantenbein, T. Braun, and T. Staub, Virtualmesh: An emulation framework for wireless mesh networks in omnet+, The 2nd International Workshop on OMNeT++ (OMNeT++ 2009) held in conjuction with the 2nd International Conference on Simulation Tools and Techniques. ICST, 2010.

A. Varga, The omnet++ discrete event simulation system, Proceedings of the European simulation multiconference (ESM'2001), p.65, 2001.
DOI : 10.1109/13.804564

J. Jonsson and B. Kaliski, Public-key cryptography standards (pkcs)# 1: Rsa cryptography specifications version 2, 2003.
DOI : 10.17487/rfc3447

X. Wang, A. C. Yao, and F. Yao, Cryptanalysis on sha-1, Cryptographic Hash Workshop hosted by NIST, 2005.

F. Tseng, L. Chou, and H. Chao, A survey of black hole attacks in wireless mobile ad hoc networks, Human-centric Computing and Information Sciences, vol.1, issue.1, pp.1-16, 2011.
DOI : 10.1016/j.comcom.2010.08.007

M. Stam and A. K. Lenstra, Speeding Up XTR, Advances in Cryptology?ASIACRYPT 35th Digital Avionics Systems Conference, pp.125-143, 2001.
DOI : 10.1007/3-540-45682-1_8