C. Perkins, S. Belding-royer, and . Das, RFC 3561-ad hoc on-demand distance vector (AODV) routing, Internet RFCs, pp.1-38, 2003.

R. Maulik and N. Chaki, A study on wormhole attacks in MANET, International Journal of Computer Information Systems and Industrial Management Applications, vol.3, issue.1, pp.271-279, 2011.

J. Maxa, G. Roudiere, and N. Larrieu, Emulation-based performance evaluation of routing protocols for uaanets, Communication Technologies for Vehicles, pp.227-240, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01132516

K. Sahingoz, Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, Journal of Intelligent & Robotic Systems, vol.74, pp.513-527, 2014.

P. Jacquet, Optimized link state routing protocol for ad hoc networks, Multi Topic Conference, pp.62-68, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00471622

B. David and . Johnson, The dynamic source routing (DSR) protocol for mobile ad hoc networks, IETF Draft, 2003.

A. Maghsoudlou, M. St-hilaire, and T. Kunz, A survey on geographic routing protocols for mobile ad hoc networks, 2011.

J. Maxa, M. S. Ben-mahmoud, and N. Larrieu, Secure routing protocol design for uav ad hoc networks, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), pp.4-5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01166852

J. Maxa, M. S. Ben-mahmoud, and N. Larrieu, Joint model-driven design and real experiment-based validation for a secure uav ad hoc network routing protocol, pp.1-2, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01292300

B. Kannhavong, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless communications, vol.14, pp.85-91, 2007.

J. Elston, Net-centric communication and control for a heterogeneous unmanned aircraft system, Journal of intelligent and Robotic Systems, vol.56, pp.199-232, 2009.

M. Pirretti, The sleep deprivation attack in sensor networks: Analysis and methods of defense, International Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006.

T. Zubair-muhammad-fadlullah, M. Taleb, and . Schöller, Combating against security attacks against mobile ad hoc networks (MANETs), Security of Self-Organizing Networks: MANET, WSN, WMN, VANET 173, pp.1-13, 2010.

J. Maxa, M. S. Ben-mahmoud, and N. Larrieu, Extended verification of secure UAANET routing protocol, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), pp.1-16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01365933

Y. Hu, A. Perrig, and D. , Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol.3, pp.1976-1986, 2003.

R. Ndoundam and J. Sadie, Collisionresistant hash function based on composition of functions, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01299415