W. M. Debusk, Unmanned aerial vehicle systems for disaster relief: Tornado alley, AIAA Infotech@ Aerospace Conference, 2010.

D. Hausamann, W. Zirnig, G. Schreier, and P. Strobl, Monitoring of gas pipelines ??? a civil UAV application, Aircraft Engineering and Aerospace Technology, vol.77, issue.5, pp.352-360, 2005.
DOI : 10.1108/00022660510617077

L. Meier, D. Honegger, and M. Pollefeys, PX4: A node-based multithreaded open source robotics framework for deeply embedded platforms, 2015 IEEE International Conference on Robotics and Automation (ICRA)
DOI : 10.1109/ICRA.2015.7140074

E. Zurich, Qgroundcontrol: Ground control station for small air land water autonomous unmanned systems, 2013.

L. Meier, P. Tanskanen, L. Heng, G. H. Lee, F. Fraundorfer et al., PIXHAWK: A micro aerial vehicle design for autonomous flight using onboard computer vision, Autonomous Robots, vol.61, issue.5, pp.21-39
DOI : 10.1007/s10514-012-9281-4

J. Yick, B. Mukherjee, and D. Ghosal, Wireless sensor network survey, Computer Networks, vol.52, issue.12, pp.2292-2330, 2008.
DOI : 10.1016/j.comnet.2008.04.002

H. Hartenstein and K. P. Laberteaux, A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine, vol.46, issue.6, pp.164-171, 2008.
DOI : 10.1109/MCOM.2008.4539481

Q. Vey, A. Pirovano, J. Radzik, and F. Garcia, Aeronautical Ad Hoc Network for Civil Aviation, Communication Technologies for Vehicles, pp.81-93, 2014.
DOI : 10.1007/978-3-319-06644-8_8

URL : https://hal.archives-ouvertes.fr/hal-00989604

S. Rosati, K. Kruzelecki, L. Traynard, and B. Rimoldi, Speedaware routing for uav ad-hoc networks, Globecom Workshops (GC Wkshps), pp.1367-1373, 2013.

J. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Designing Privacy Enhancing Technologies, pp.10-29, 2001.
DOI : 10.1007/3-540-44702-4_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

I. Bekmezci and O. K. Sahingoz, Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013.
DOI : 10.1016/j.adhoc.2012.12.004

E. W. Frew and T. X. Brown, Networking Issues for Small Unmanned Aircraft Systems, Journal of Intelligent and Robotic Systems, vol.24, issue.2, pp.21-37, 2009.
DOI : 10.1007/s10846-008-9253-2

J. Li, Y. Zhou, and L. Lamont, Communication architectures and protocols for networking unmanned aerial vehicles, Globecom Workshops (GC Wkshps), pp.1415-1420, 2013.

L. Gupta, R. Jain, and G. Vaszkun, Survey of Important Issues in UAV Communication Networks, IEEE Communications Surveys & Tutorials, vol.18, issue.2
DOI : 10.1109/COMST.2015.2495297

K. Namuduri, Y. Wan, and M. Gomathisankaran, Mobile ad hoc networks in the sky, Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications, ANC '13, pp.25-28, 2013.
DOI : 10.1145/2491260.2491265

O. K. Sahingoz, Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, Journal of Intelligent & Robotic Systems, vol.2869, issue.2003, pp.513-527, 2014.
DOI : 10.1007/s10846-013-9959-7

S. K. Singh, A comprehensive survey on fanet: Challenges and advancements

A. Maghsoudlou, M. St-hilaire, and T. Kunz, A survey on geographic routing protocols for mobile ad hoc networks, Systems and Computer Engineering, 2011.

L. Song and T. Huang, A summary of key technologies of ad hoc networks with UAV node, 2010 International Conference on Intelligent Computing and Integrated Systems, pp.944-949, 2010.
DOI : 10.1109/ICISS.2010.5657024

Z. Zhao and T. Braun, Topology control and mobility strategy for uav ad-hoc networks: A survey, Joint ERCIM eMobility and MobiSense Workshop, pp.27-32, 2012.

I. Bekmezci, E. Senturk, and T. Turker, Security issues in flying adhoc networks (fanets)

O. K. Sahingoz, Mobile networking with UAVs: Opportunities and challenges, 2013 International Conference on Unmanned Aircraft Systems (ICUAS), pp.933-941, 2013.
DOI : 10.1109/ICUAS.2013.6564779

K. Dalamagkidis, Classification of UAVs, Handbook of Unmanned Aerial Vehicles, pp.83-91, 2014.
DOI : 10.1007/978-90-481-9707-1_94

R. Loh, Y. Bian, and T. Roe, Uavs in civil airspace: Safety requirements Aerospace and Electronic Systems Magazine, pp.5-17, 2009.

T. X. Brown, B. Argrow, C. Dixon, S. Doshi, and P. Nies, Ad hoc uav-ground network (augnet) test bed, 4th Scandinavian Workshop on Wireless Ad-hoc Networks, pp.4-5, 2004.
DOI : 10.2514/6.2004-6321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Gruber, H. Kwon, C. Hager, R. Sharma, J. Yoder et al., UAV Handbook: Payload Design of Small UAVs, Handbook of Unmanned Aerial Vehicles, pp.143-163, 2014.
DOI : 10.1007/978-90-481-9707-1_84

P. Fahlstrom and T. Gleason, Introduction to UAV systems, 2012.
DOI : 10.1002/9781118396780

O. Bouachir, A. Abrassart, F. Garcia, and N. Larrieu, A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp.383-388, 2014.
DOI : 10.1109/ICUAS.2014.6842277

URL : https://hal.archives-ouvertes.fr/hal-00998651

J. Maxa, B. Mahmoud, M. Slim, and N. Larrieu, Secure routing protocol design for uav ad hoc networks, Digital Avionics Systems Conference (DASC), pp.4-5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01166852

J. Maxa, G. Roudiere, and N. Larrieu, Emulation-Based Performance Evaluation of Routing Protocols for Uaanets, Communication Technologies for Vehicles, pp.227-240, 2015.
DOI : 10.1007/978-3-319-17765-6_20

URL : https://hal.archives-ouvertes.fr/hal-01132516

J. Maxa, Model-driven approach to design a secure routing protocol for uav adhoc networks, EDSYS 2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01166854

K. Zhang, W. Zhang, and J. Zeng, Preliminary Study of Routing and Date Integrity in Mobile Ad Hoc UAV Network, 2008 International Conference on Apperceiving Computing and Intelligence Analysis, 2008.
DOI : 10.1109/ICACIA.2008.4770039

A. I. Alshbatat and L. Dong, Cross layer design for mobile Ad-Hoc Unmanned Aerial Vehicle communication networks, 2010 International Conference on Networking, Sensing and Control (ICNSC), pp.331-336, 2010.
DOI : 10.1109/ICNSC.2010.5461502

B. Cheng and S. Moore, A comparison of MANET routing protocols on airborne tactical networks, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6, 2012.
DOI : 10.1109/MILCOM.2012.6415798

F. A. Aloul and N. Kandasamy, Sensor Deployment for Failure Diagnosis in Networked Aerial Robots: A Satisfiability-Based Approach, Theory and Applications of Satisfiability Testing?SAT 2007, pp.369-376, 2007.
DOI : 10.1007/978-3-540-72788-0_35

R. Shirani, M. St-hilaire, T. Kunz, Y. Zhou, J. Li et al., Combined reactive-geographic routing for unmanned aeronautical adhoc networks, Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International, pp.820-826, 2012.
DOI : 10.1109/iwcmc.2012.6314310

L. Reynaud and T. Rasheed, Deployable aerial communication networks, Proceedings of the 9th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, PE-WASUN '12, pp.9-16, 2012.
DOI : 10.1145/2387027.2387030

Y. Li, M. St-hilaire, and T. Kunz, Improving routing in networks of uavs via scoped flooding and mobility prediction, Wireless Days (WD), 2012 IFIP, pp.1-6, 2012.

S. Rohde, N. Goddemeier, K. Daniel, and C. Wietfeld, Link quality dependent mobility strategies for distributed aerial sensor networks, 2010 IEEE Globecom Workshops, pp.1783-1787, 2010.
DOI : 10.1109/GLOCOMW.2010.5700248

N. Shi and X. Luo, A novel cluster-based location-aided routing protocol for uav fleet networks, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.376, 2012.

R. Laplace, Applications et services dtn pour flotte collaborative de drones, 2012.
URL : https://hal.archives-ouvertes.fr/tel-00795890

J. Elston, E. W. Frew, D. Lawrence, P. Gray, and B. Argrow, Net-Centric Communication and Control for a Heterogeneous Unmanned Aircraft System, Journal of Intelligent and Robotic Systems, vol.31, issue.5, pp.199-232, 2009.
DOI : 10.1007/s10846-009-9334-x

B. Bellur, M. Lewis, and F. Templin, An ad-hoc network for teams of autonomous vehicles, Proceedings of the First Annual Symposium on Autonomous Intelligence Networks and Systems. Citeseer, 2002.

R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, DoS Attacks in Mobile Ad Hoc Networks: A Survey, 2012 Second International Conference on Advanced Computing & Communication Technologies, pp.535-541, 2012.
DOI : 10.1109/ACCT.2012.48

P. N. Raj and P. B. Swadas, Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet, 2009.

Y. Hu, A. Perrig, and D. B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.30-40, 2003.
DOI : 10.1145/941311.941317

S. Chaumette, R. Laplace, C. Mazel, R. Mirault, A. Dunand et al., CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience, 2011, MILCOM 2011 Military Communications Conference, pp.2003-2010, 2011.
DOI : 10.1109/MILCOM.2011.6127613

D. Johnson, Y. Hu, and D. Maltz, The dynamic source routing protocol (dsr) for mobile ad hoc networks for ipv4, 2007.
DOI : 10.17487/rfc4728

K. Daniel, B. Dusza, A. Lewandowski, and C. Wietfeld, AirShield: A system-of-systems MUAV remote sensing architecture for disaster response, 2009 3rd Annual IEEE Systems Conference, pp.196-200, 2009.
DOI : 10.1109/SYSTEMS.2009.4815797

S. Cameron, S. Hailes, S. Julier, S. Mcclean, G. Parr et al., Suaave: Combining aerial robots and wireless networking, 25th Bristol International UAV Systems Conference, pp.1-14, 2010.

R. Nair, M. Tambe, M. Yokoo, D. Pynadath, and S. Marsella, Taming decentralized pomdps: Towards efficient policy computation for multiagent settings, IJCAI, pp.705-711, 2003.

D. J. Pack, P. Delima, G. J. Toussaint, and G. York, Cooperative Control of UAVs for Localization of Intermittently Emitting Mobile Targets, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol.39, issue.4, pp.959-970, 2009.
DOI : 10.1109/TSMCB.2008.2010865

S. Hauert, S. Leven, J. Zufferey, and D. Floreano, The swarming micro air vehicle network (smavnet) project, 2015.

T. Clausen and P. Jacquet, Optimized link state routing protocol (olsr), Tech. Rep, 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

J. Maxa, M. B. Mahmoud, and N. Larrieu, Extended verification of secure UAANET routing protocol, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 2016.
DOI : 10.1109/DASC.2016.7777970

URL : https://hal.archives-ouvertes.fr/hal-01365933

O. Bouachir, F. Garcia, A. Abrassart, and N. Larrieu, A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), 2014.
DOI : 10.1109/ICUAS.2014.6842277

URL : https://hal.archives-ouvertes.fr/hal-00998651

C. Cheng, P. Hsiao, H. Kung, and D. Vlah, Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm, 2007 IEEE Wireless Communications and Networking Conference, pp.4417-4424, 2007.
DOI : 10.1109/WCNC.2007.805

O. Bouachir, F. Garcia, N. Larrieu, and T. Gayraud, Ad hoc network QoS architecture for cooperative Unmanned Aerial Vehicles (UAVs), 2013 IFIP Wireless Days (WD), pp.1-4, 2013.
DOI : 10.1109/WD.2013.6686488

URL : https://hal.archives-ouvertes.fr/hal-00934262

A. Bürkle, F. Segor, and M. Kollmann, Towards Autonomous Micro UAV Swarms, Journal of Intelligent & Robotic Systems, vol.37, issue.7, pp.339-353, 2011.
DOI : 10.1007/s10846-010-9492-x

R. Jurdak, C. V. Lopes, and P. Baldi, A survey, classification and comparative analysis of medium access control protocols for ad hoc networks, IEEE Communications Surveys & Tutorials, vol.6, issue.1, pp.2-16, 2004.
DOI : 10.1109/COMST.2004.5342231

Y. Li and X. Luo, Cross layer optimization for cooperative mobile adhoc uav network, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.367, 2012.

G. Bianchi, Performance analysis of the ieee 802.11 distributed coordination function Selected Areas in Communications, IEEE Journal on, vol.18, issue.3, pp.535-547, 2000.

J. Yin, T. Elbatt, G. Yeung, B. Ryu, S. Habermas et al., Performance evaluation of safety applications over DSRC vehicular ad hoc networks, Proceedings of the first ACM workshop on Vehicular ad hoc networks , VANET '04, pp.1-9, 2004.
DOI : 10.1145/1023875.1023877

Y. J. Li, An Overview of the DSRC/WAVE Technology, Quality, Reliability , Security and Robustness in Heterogeneous Networks, pp.544-558, 2012.
DOI : 10.1007/978-3-642-29222-4_38

D. Jiang and L. Delgrossi, Ieee 80211 p: Towards an international standard for wireless access in vehicular environments, Vehicular Technology Conference, pp.2036-2040, 2008.

C. Perkins, E. Belding-royer, and S. Das, Ad hoc on-demand distance vector (aodv) routing, 2003.
DOI : 10.17487/rfc3561

S. Mohseni, R. Hassan, A. Patel, and R. Razali, Comparative review study of reactive and proactive routing protocols in MANETs, 4th IEEE International Conference on Digital Ecosystems and Technologies, pp.304-309, 2010.
DOI : 10.1109/DEST.2010.5610631

D. S. Vasiliev, D. S. Meitis, and A. Abilov, Simulation-Based Comparison of AODV, OLSR and HWMP Protocols for Flying Ad Hoc Networks, Internet of Things, Smart Spaces, and Next Generation Networks and Systems, pp.245-252, 2014.
DOI : 10.1007/978-3-319-10353-2_21

M. Hyland, B. E. Mullins, R. O. Baldwin, and M. A. Temple, Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.249-256, 2007.
DOI : 10.1109/AINAW.2007.336

J. Pojda, A. Wolff, M. Sbeiti, and C. Wietfeld, Performance analysis of mesh routing protocols for UAV swarming applications, 2011 8th International Symposium on Wireless Communication Systems, pp.317-321, 2011.
DOI : 10.1109/ISWCS.2011.6125375

R. G. Ogier, F. L. Templin, B. Bellur, and M. G. Lewis, Topology broadcast based on reverse-path forwarding (tbrpf), " draft-ietf- manettbrpf-05, 2002.
DOI : 10.17487/rfc3684

S. Skiena, Dijkstra's algorithm Implementing Discrete Mathematics: Combinatorics and Graph Theory with Mathematica, pp.225-227, 1990.

A. Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Bölöni et al., Routing protocols in ad hoc networks: A survey, Computer Networks, vol.55, issue.13, pp.3032-3080, 2011.
DOI : 10.1016/j.comnet.2011.05.010

D. Johnson, N. Ntlatlapa, and C. Aichele, Simple pragmatic approach to mesh routing using batman, 2008.

L. Barolli, M. Ikeda, G. D. Marco, A. Durresi, and F. Xhafa, Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality Parameter, 2009 International Conference on Advanced Information Networking and Applications, pp.307-314, 2009.
DOI : 10.1109/AINA.2009.28

M. Abolhasan, B. Hagelstein, and J. Wang, Real-world performance of current proactive multi-hop mesh protocols, 2009 15th Asia-Pacific Conference on Communications, pp.44-47, 2009.
DOI : 10.1109/APCC.2009.5375690

C. E. Perkins and P. Bhagwat, Dsdv routing over a multihop wireless network of mobile computers, Ad hoc networking, pp.53-74, 2001.

K. Xu, X. Hong, M. Gerla, H. Ly, and D. L. Gu, Landmark routing in large wireless battlefield networks using uavs, Military Communications Conference MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, pp.230-234, 2001.

G. Pei, M. Gerla, and X. Hong, Lanmar: landmark routing for large scale wireless ad hoc networks with group mobility, Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, pp.11-18, 2000.

G. Pei, M. Gerla, and T. Chen, Fisheye state routing: A routing scheme for ad hoc wireless networks, IEEE International Conference on, pp.70-74, 2000.

T. Chen and M. Gerla, Global state routing: A new routing scheme for ad-hoc wireless networks, Communications, 1998. ICC 98. Conference Record. 1998 IEEE International Conference on, pp.171-175, 1998.

D. Wu, X. Zhao, and F. Zhu, Simulation study and realization of uav ad hoc network in reencounter scenario, Journal of system simulation, vol.20, issue.23, pp.6409-6413, 2011.

A. I. Alshabtat, L. Dong, J. Li, and F. Yang, Low latency routing algorithm for unmanned aerial vehicles ad-hoc networks, International Journal of Electrical and Computer Engineering, vol.6, issue.1, pp.48-54, 2010.

U. Paparazzi, Url http://paparazzi. enac. fr/wiki

M. E. Campista, P. M. Esposito, I. M. Moraes, L. H. Costa, O. C. Duarte et al., Routing Metrics and Protocols for Wireless Mesh Networks, IEEE Network, vol.22, issue.1, pp.6-12, 2008.
DOI : 10.1109/MNET.2008.4435897

Y. Zheng, Y. Wang, Z. Li, L. Dong, Y. Jiang et al., A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks, 2014 International Conference on Information and Communications Technologies (ICT 2014), pp.1-7, 2014.
DOI : 10.1049/cp.2014.0575

M. Mabrouk and C. Mcinnes, Solving the potential field local minimum problem using internal agent states, Robotics and Autonomous Systems, vol.56, issue.12, pp.1050-1060, 2008.
DOI : 10.1016/j.robot.2008.09.006

H. Kalosha, A. Nayak, S. Ruhrup, and I. Stojmenovic, Select-andprotest-based beaconless georouting with guaranteed delivery in wireless sensor networks, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.

R. Jayakumar, K. Thulasiraman, and M. N. Swamy, o (n 2) algorithms for graph planarization Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, vol.8, issue.3, pp.257-267, 1989.

P. Anghel and M. Kaveh, Exact Symbol Error Probability of a Cooperative Network in a Rayleigh-Fading Environment, IEEE Transactions on Wireless Communications, vol.3, issue.5, pp.1416-1421, 2004.
DOI : 10.1109/TWC.2004.833431

J. Sanchez, R. Marin-perez, and P. M. Ruiz, BOSS: Beacon-less On Demand Strategy for Geographic Routing inWireless Sensor Networks, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, pp.1-10, 2007.
DOI : 10.1109/MOBHOC.2007.4428612

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Bradner, temporally-ordered routing algorithm (tora) routing ietf Internet Draft, draft-ietf-manet-tora-spec-04, 2001.

J. D. Zhai, Z. , and Y. Ren, The application and improvement of temporally ordered routing algorithm in swarm network with unmanned aerial vehicle nodes, ICWMC 2013 The Ninth International Conference on Wireless and Mobile Communications, 2013.

J. H. Forsmann, R. E. Hiromoto, and J. Svoboda, A time-slotted ondemand routing protocol for mobile ad hoc unmanned vehicle systems, Defense and Security Symposium. International Society for Optics and Photonics, pp.65-611, 2007.

F. Baccelli, B. Blaszczyszyn, and P. Mühlethaler, An aloha protocol for multihop mobile wireless networks Information Theory, IEEE Transactions on, vol.52, issue.2, pp.421-436, 2006.

R. Shirani, Reactive-greedy-reactive in unmanned aeronautical ad-hoc networks: A combinational routing mechanism, 2011.

R. Shirani, M. St-hilaire, T. Kunz, Y. Zhou, J. Li et al., The Performance of Greedy Geographic Forwarding in Unmanned Aeronautical Ad-Hoc Networks, 2011 Ninth Annual Communication Networks and Services Research Conference, pp.161-166, 2011.
DOI : 10.1109/CNSR.2011.31

Y. Kim, R. Govindan, B. Karp, and S. Shenker, Geographic routing made practical, Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2. USENIX Association, pp.217-230, 2005.

I. Stojmenovic, Position-based routing in ad hoc networks, IEEE Communications Magazine, vol.40, issue.7, pp.128-134, 2002.
DOI : 10.1109/MCOM.2002.1018018

L. Lin, Q. Sun, J. Li, and F. Yang, A novel geographic position mobility oriented routing strategy for uavs, Journal of Computational Information Systems, vol.8, issue.2, pp.709-716, 2012.

L. Lin, Q. Sun, S. Wang, and F. Yang, A geographic mobility prediction routing protocol for Ad Hoc UAV Network, 2012 IEEE Globecom Workshops, pp.1597-1602, 2012.
DOI : 10.1109/GLOCOMW.2012.6477824

N. Meghanathan, Impact of the Gauss-Markov Mobility Model on Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc Networks, Journal of Networks, vol.5, issue.5, pp.509-516, 2010.
DOI : 10.4304/jnw.5.5.509-516

D. Medina, F. Hoffmann, F. Rossetto, and C. Rokitansky, A Crosslayer Geographic Routing Algorithm for the Airborne Internet, 2010 IEEE International Conference on Communications, pp.1-6, 2010.
DOI : 10.1109/ICC.2010.5502351

B. Karp and H. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000.
DOI : 10.1145/345910.345953

R. L. Lidowski, B. E. Mullins, and R. O. Baldwin, A novel communications protocol using geographic routing for swarming UAVs performing a Search Mission, 2009 IEEE International Conference on Pervasive Computing and Communications, pp.1-7, 2009.
DOI : 10.1109/PERCOM.2009.4912764

E. Kuiper and S. Nadjm-tehrani, Geographical Routing in Intermittently Connected Ad Hoc Networks, 22nd International Conference on Advanced Information Networking and Applications, Workshops (aina workshops 2008), pp.1690-1695, 2008.
DOI : 10.1109/WAINA.2008.132

L. Kesheng, Z. Jun, and Z. Tao, The clustering algorithm of uav networking in near-space, Antennas, Propagation and EM Theory 8th International Symposium on. IEEE, pp.1550-1553, 2008.

C. Zang and S. Zang, Mobility prediction clustering algorithm for UAV networking, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.1158-1161, 2011.
DOI : 10.1109/GLOCOMW.2011.6162360

C. R. Lin and M. Gerla, Adaptive clustering for mobile wireless networks Selected Areas in Communications, IEEE Journal on, vol.15, issue.7, pp.1265-1275, 1997.

N. Martin, Y. Mousa, and N. Shenoy, An Integrated Routing and Medium Access Control Framework for Surveillance Networks of Mobile Devices, Distributed Computing and Networking, pp.315-327, 2011.
DOI : 10.1007/978-3-642-17679-1_28

M. Chatterjee, S. K. Das, and D. Turgut, Wca: A weighted clustering algorithm for mobile ad hoc networks, Cluster Computing, vol.5, issue.2, pp.193-204, 2002.
DOI : 10.1023/A:1013941929408

B. Fu and L. Dasilva, A Mesh in the Sky: A Routing Protocol for Airborne Networks, MILCOM 2007, IEEE Military Communications Conference, pp.1-7, 2007.
DOI : 10.1109/MILCOM.2007.4454819

N. Larrieu, How can model driven development approaches improve the certification process for UAS?, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp.253-260, 2014.
DOI : 10.1109/ICUAS.2014.6842263

URL : https://hal.archives-ouvertes.fr/hal-00977096

N. Larrieu and A. Varet, Methodology for Rapid Prototyping Avionic Software, Rapid Prototyping of Software for Avionics Systems, pp.23-60
DOI : 10.1002/9781119050643.ch2

R. N. Akram, P. Bonnefoi, S. Chaumette, K. Markantonakis, and D. Sauveron, Improving security of autonomous uavs fleets by using new specific embedded secure elements a position paper

P. Luong, Securing embedded systems for autonomous aerial vehicles, 2013.

A. N. Phillips, A secure group communication architecture for a swarm of autonomous unmanned aerial vehicles, DTIC Document, Tech. Rep, 2008.

R. S. Yokoyama, B. Y. Kimura, E. , and S. Moreira, An architecture for secure positioning in a UAV swarm using RSSI-based distance estimation, ACM SIGAPP Applied Computing Review, vol.14, issue.2, pp.36-44, 2014.
DOI : 10.1145/2656864.2656867

A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, Cyber security threat analysis and modeling of an unmanned aerial vehicle system, 2012 IEEE Conference on Technologies for Homeland Security (HST), pp.585-590, 2012.
DOI : 10.1109/THS.2012.6459914

P. Yi, Z. Dai, S. Zhang, and Y. Zhong, A new routing attack in mobile ad hoc networks, International Journal of Information Technology, vol.11, issue.2, pp.83-94, 2005.

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, M. Kandemir et al., The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, International Journal of Distributed Sensor Networks, vol.19, issue.2, pp.267-287, 2006.
DOI : 10.1080/15501320600642718

D. Westhoff, B. Lamparter, C. Paar, and A. Weimerskirch, On digital signatures in ad hoc networks, European Transactions on Telecommunications, vol.3, issue.5, pp.411-425, 2005.
DOI : 10.1002/ett.1061

I. Cervesato, The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001.

J. Cordasco and S. Wetzel, An attacker model for MANET routing security, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.87-94, 2009.
DOI : 10.1145/1514274.1514288

W. M. Eddy, Syn flood attack, Encyclopedia of Cryptography and Security, pp.1273-1274, 2011.

Y. Hu, A. Perrig, and D. B. Johnson, Wormhole attacks in wireless networks, Selected Areas in Communications, pp.370-380, 2006.

H. Aldabbas, T. Alwada-'n, H. Janicke, and A. , Data Confidentiality in Mobile Ad hoc Networks, International Journal of Wireless & Mobile Networks, vol.4, issue.1, 2012.
DOI : 10.5121/ijwmn.2012.4117

K. S. Win, Analysis of detecting wormhole attack in wireless networks, World Academy of Science, Engineering and Technology. Citeseer, 2008.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, vol.14, issue.5, pp.85-91, 2007.
DOI : 10.1109/MWC.2007.4396947

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, pp.103-135, 2007.
DOI : 10.1007/978-0-387-33112-6_5

J. R. Douceur, The sybil attack, " in Peer-to-peer Systems, pp.251-260, 2002.

G. Peng and Z. Chuanyun, Routing Attacks and Solutions in Mobile Ad hoc Networks, 2006 International Conference on Communication Technology, pp.1-4, 2006.
DOI : 10.1109/ICCT.2006.341678

N. Kang, E. M. Shakshuki, and T. R. Sheltami, Detecting Forged Acknowledgements in MANETs, 2011 IEEE International Conference on Advanced Information Networking and Applications, pp.488-494, 2011.
DOI : 10.1109/AINA.2011.84

F. Kandah, Y. Singh, and C. Wang, Colluding injected attack in mobile ad-hoc networks, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.235-240, 2011.
DOI : 10.1109/INFCOMW.2011.5928815

A. K. Abdelaziz, M. Nafaa, and G. Salim, Survey of routing attacks and countermeasures in mobile ad hoc networks, Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on, pp.693-698, 2013.

A. K. Rai, R. R. Tewari, and S. K. Upadhyay, Different types of attacks on integrated manet-internet communication, International Journal of Computer Science and Security, vol.4, issue.3, pp.265-274, 2010.

Z. M. Fadlullah, T. Taleb, and M. Schöller, Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs), Security of Self- Organizing Networks: MANET, 2010.
DOI : 10.1201/EBK1439819197-11

F. Tseng, L. Chou, and H. Chao, A survey of black hole attacks in wireless mobile ad hoc networks, Human-centric Computing and Information Sciences, vol.1, issue.1, pp.1-16, 2011.
DOI : 10.1016/j.comcom.2010.08.007

A. Ivanov, Side-channel attacks, 2005.

M. G. Zapata, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002.
DOI : 10.1145/581291.581312

G. Montenegro and C. Castelluccia, Statistically unique and cryptographically verifiable (sucv) identifiers and addresses, Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS. Citeseer, 2002.

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-rotaru, and H. Rubens, Mitigating byzantine attacks in ad hoc wireless networks, Tech. Rep. Version, vol.1, 2004.

P. Syverson, A taxonomy of replay attacks [cryptographic protocols], Proceedings The Computer Security Foundations Workshop VII, pp.187-191, 1994.
DOI : 10.1109/CSFW.1994.315935

R. V. Boppana and S. Desilva, Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.559-563, 2006.
DOI : 10.1109/WOWMOM.2006.43

S. Yi, P. Naldurg, and R. Kravets, Security-aware ad hoc routing for wireless networks, Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '01, pp.299-302, 2001.
DOI : 10.1145/501416.501464

Y. Hu, A. Perrig, and D. B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003.
DOI : 10.1109/INFCOM.2003.1209219

C. Adjih, D. Raffo, and P. Mühlethaler, Attacks against olsr: Distributed key management for security, 2nd OLSR Interop, 2005.

C. Crepeau, C. R. Davis, and M. Maheswaran, A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.19-26, 2007.
DOI : 10.1109/AINAW.2007.54

B. N. Levine, C. Shields, N. B. Margolin, B. Xiao, B. Yu et al., A survey of solutions to the sybil attack Detection and localization of sybil nodes in vanets, Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pp.1-8, 2006.

C. Harsch, A. Festag, and P. Papadimitratos, Secure Position-Based Routing for VANETs, 2007 IEEE 66th Vehicular Technology Conference, pp.26-30, 2007.
DOI : 10.1109/VETECF.2007.22

S. Desilva and R. V. Boppana, Mitigating malicious control packet floods in ad hoc networks, IEEE Wireless Communications and Networking Conference, 2005, pp.2112-2117, 2005.
DOI : 10.1109/WCNC.2005.1424844

D. Raffo, C. Adjih, T. Clausen, and P. Mühlethaler, Securing olsr using node locations, Wireless Conference 2005-Next Generation Wireless and Mobile Communications and Services (European Wireless), 11th European. VDE, pp.1-7, 2005.

N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications, vol.23, issue.17, pp.1627-1637, 2000.
DOI : 10.1016/S0140-3664(00)00249-8

W. Diffie and M. E. Hellman, New directions in cryptography Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.31-37, 1996.
DOI : 10.1145/238168.238182

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. M. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992.
DOI : 10.1109/RISP.1992.213269

URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf

F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.
DOI : 10.1007/10720107_24

Y. G. Desmedt, Threshold cryptography, European Transactions on Telecommunications, vol.35, issue.1, pp.449-458, 1994.
DOI : 10.1002/ett.4460050407

M. May, Specification-based intrusion detection, 2004.

P. Garcia-teodoro, J. Diaz-verdejo, G. Maciá-fernández, and E. Vázquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, " computers & security, pp.18-28, 2009.

T. Bass, Intrusion detection systems and multisensor data fusion, Communications of the ACM, vol.43, issue.4, pp.99-105, 2000.
DOI : 10.1145/332051.332079

R. V. Boppana and X. Su, An Analysis of Monitoring Based Intrusion Detection for Ad Hoc Networks, IEEE GLOBECOM 2008, 2008 IEEE Global Telecommunications Conference, pp.1-5, 2008.
DOI : 10.1109/GLOCOM.2008.ECP.402

C. H. Tseng, S. Wang, C. Ko, and K. Levitt, DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET, Recent Advances in Intrusion Detection, pp.249-271, 2006.
DOI : 10.1007/11856214_13

W. Huang and . Lee, A cooperative intrusion detection system for ad hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.135-147, 2003.
DOI : 10.1145/986858.986877

M. N. Mejri, J. Ben-othman, and M. Hamdi, Survey on VANET security challenges and possible cryptographic solutions, Vehicular Communications, vol.1, issue.2, pp.53-66, 2014.
DOI : 10.1016/j.vehcom.2014.05.001

M. G. Zapata and N. Asokan, Securing ad hoc routing protocols, Proceedings of the ACM workshop on Wireless security , WiSE '02, pp.1-10, 2002.
DOI : 10.1145/570681.570682

S. Eichler and C. Roman, Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, pp.481-484, 2006.
DOI : 10.1109/MOBHOC.2006.278589

A. A. Hanafy, S. H. Noureldin, and M. A. Azer, Immunizing the saodv protocol against routing information disclosure, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.330-334, 2011.

S. Khurana, N. Gupta, and N. Aneja, Reliable Ad-hoc On-demand Distance Vector Routing Protocol, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), pp.98-98, 2006.
DOI : 10.1109/ICNICONSMCL.2006.183

L. Bononi and C. Tacconi, Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks, International Journal of Information Security, vol.7, issue.1, pp.379-392, 2007.
DOI : 10.1007/s10207-007-0035-9

D. Cerri and A. Ghioni, Securing AODV: the A-SAODV secure routing prototype, IEEE Communications Magazine, vol.46, issue.2, pp.120-125, 2008.
DOI : 10.1109/MCOM.2008.4473093

I. Stamouli, P. G. Argyroudis, and H. Tewari, Real-Time Intrusion Detection for Ad Hoc Networks, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, pp.374-380, 2005.
DOI : 10.1109/WOWMOM.2005.85

A. Aggarwal, S. Gandhi, N. Chaubey, N. Tada, and S. Trivedi, NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to Mitigate Flood Attack in Manets, International journal of Computer Networks & Communications, vol.6, issue.1, 2014.
DOI : 10.5121/ijcnc.2014.6102

K. Sanzgiri, D. Laflamme, B. Dahill, B. N. Levine, C. Shields et al., Authenticated routing for ad hoc networks Selected Areas in Communications, IEEE Journal on, vol.23, issue.3, pp.598-610, 2005.

J. Li, M. Lyu, and J. Liu, Taodv: A trusted aodv routing protocol for mobile ad hoc networks, Proceedings of Aerospace Conference, 2004.

B. Mancini, The great reconnaissance: A uav project in niger, GeoInformatics, vol.17, issue.6, p.6, 2014.

L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. Chang, Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, IEEE Wireless Communications and Networking Conference, 2005, pp.1193-1199, 2005.
DOI : 10.1109/WCNC.2005.1424678

R. Akbani, T. Korkmaz, and G. Raju, HEAP: A packet authentication scheme for mobile ad hoc networks, Ad Hoc Networks, pp.1134-1150, 2008.
DOI : 10.1016/j.adhoc.2007.11.002

C. Li, Z. Wang, and C. Yang, Seaodv: A security enhanced aodv routing protocol for wireless mesh networks, Transactions on computational science XI, pp.1-16, 2010.

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, The tesla broadcast authentication protocol, RSA CryptoBytes, vol.5, 2005.

Q. Li, Y. Hu, M. Zhao, A. Perrig, J. Walker et al., SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.201-204, 2008.
DOI : 10.1145/1368310.1368339

A. Perrig and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, IEEE INFOCOM, pp.1976-1986, 2003.

H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid, IEEE Systems Journal, vol.8, issue.2, pp.655-663, 2014.
DOI : 10.1109/JSYST.2013.2271537

A. Hanafy, M. A. Azer, and S. H. Noureldin, SAODV and modified SAODV performance comparison, 2013 8th International Conference on Computer Engineering & Systems (ICCES), pp.95-98, 2013.
DOI : 10.1109/ICCES.2013.6707180

T. Wu, Y. Xue, and Y. Cui, Preserving traffic privacy in wireless mesh networks, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pp.459-461, 2006.

S. Bouam and J. Ben-othman, Data security in ad hoc networks using multipath routing, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., pp.1331-1335, 2003.
DOI : 10.1109/PIMRC.2003.1260329

A. Patel, N. Patel, and R. Patel, Defending against Wormhole Attack in MANET, 2015 Fifth International Conference on Communication Systems and Network Technologies, pp.674-678, 2015.
DOI : 10.1109/CSNT.2015.253

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, NDSS, 2004.