Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013. ,
DOI : 10.1016/j.adhoc.2012.12.004
A study on wormhole attacks in manet, International Journal of Computer Information Systems and Industrial Management Applications ISSN, pp.2150-7988, 2011. ,
Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002. ,
DOI : 10.1145/581291.581312
Generate c and c++ code optimized for embedded systems, 2014 the mathworks ,
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Secure routing protocol design for uav ad hoc networks, Digital Avionics Systems Conference (DASC), pp.4-5, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01166852
Emulation-Based Performance Evaluation of Routing Protocols for Uaanets, Communication Technologies for Vehicles, pp.227-240, 2015. ,
DOI : 10.1007/978-3-319-17765-6_20
URL : https://hal.archives-ouvertes.fr/hal-01132516
Rfc 3561-ad hoc ondemand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003. ,
UAV Payload and Mission Control Hardware/Software Architecture, IEEE Aerospace and Electronic Systems Magazine, vol.22, issue.6, pp.3-8, 2007. ,
DOI : 10.1109/MAES.2007.384074
Communication architectures and protocols for networking unmanned aerial vehicles, Globecom Workshops (GC Wkshps), pp.1415-1420, 2013. ,
AirShield: A system-of-systems MUAV remote sensing architecture for disaster response, 2009 3rd Annual IEEE Systems Conference, pp.196-200, 2009. ,
DOI : 10.1109/SYSTEMS.2009.4815797
Optimized link state routing protocol for ad hoc networks Technology for the 21st Century, Multi Topic Conference, pp.62-68, 2001. ,
The dynamic source routing (dsr) protocol for mobile ad hoc networks, 2003. ,
DOI : 10.17487/rfc4728
A survey on geographic routing protocols for mobile ad hoc networks, 2011. ,
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.249-256, 2007. ,
DOI : 10.1109/AINAW.2007.336
Joint Model-Driven design and real experiment-based validation for a secure UAV Ad hoc Network routing protocol, 2016 Integrated Communications Navigation and Surveillance (ICNS), 2016. ,
DOI : 10.1109/ICNSURV.2016.7486324
URL : https://hal.archives-ouvertes.fr/hal-01292300
Sleep deprivation attack detection in wireless sensor network arXiv preprint arXiv:1203.0231 Authenticated routing for ad hoc networks, Selected Areas in Communications, pp.598-610, 2005. ,
SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.325-340, 2009. ,
DOI : 10.1145/1368310.1368339
SEAODV, Proceedings of the 2nd International Conference on Interaction Sciences Information Technology, Culture and Human, ICIS '09, pp.940-944, 2009. ,
DOI : 10.1145/1655925.1656096
An attacker model for MANET routing security, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.87-94, 2009. ,
DOI : 10.1145/1514274.1514288
Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003. ,
DOI : 10.1109/INFCOM.2003.1209219
Security considerations for the sha-0 and sha-1 message-digest algorithms, 2011. ,
DOI : 10.17487/rfc6194
Methodology for Rapid Prototyping Avionic Software, Rapid Prototyping of Software for Avionics Systems, pp.23-60 ,
DOI : 10.1002/9781119050643.ch2
Towards understanding the DO-178C / ED-12C assurance case, 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012, 2012. ,
DOI : 10.1049/cp.2012.1499
Developing safety-critical software: a practical guide for aviation software and DO-178C compliance, 2013. ,
Formal Methods in Avionic Software Certification: The DO-178C Perspective, International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, pp.205-215, 2012. ,
DOI : 10.1007/978-3-642-34032-1_21
Ad hoc on-demand distance vector (aodv) routing, 2003. ,
DOI : 10.17487/rfc3561
The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001. ,
Virtualbox, 2013. ,
Virtualmesh: An emulation framework for wireless mesh networks in omnet+, The 2nd International Workshop on OMNeT++ (OMNeT++ 2009) held in conjuction with the 2nd International Conference on Simulation Tools and Techniques. ICST, 2010. ,
The omnet++ discrete event simulation system, Proceedings of the European simulation multiconference (ESM'2001), p.65, 2001. ,
DOI : 10.1109/13.804564
Public-key cryptography standards (pkcs)# 1: Rsa cryptography specifications version 2, 2003. ,
DOI : 10.17487/rfc3447
Cryptanalysis on sha-1, Cryptographic Hash Workshop hosted by NIST, 2005. ,
A survey of black hole attacks in wireless mobile ad hoc networks, Human-centric Computing and Information Sciences, vol.1, issue.1, pp.1-16, 2011. ,
DOI : 10.1016/j.comcom.2010.08.007
Speeding Up XTR, Advances in Cryptology?ASIACRYPT 35th Digital Avionics Systems Conference, pp.125-143, 2001. ,
DOI : 10.1007/3-540-45682-1_8