RFC 3561-ad hoc on-demand distance vector (AODV) routing, Internet RFCs, pp.1-38, 2003. ,
A study on wormhole attacks in MANET, International Journal of Computer Information Systems and Industrial Management Applications, vol.3, issue.1, pp.271-279, 2011. ,
Emulation-based performance evaluation of routing protocols for uaanets, Communication Technologies for Vehicles, pp.227-240, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01132516
Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, Journal of Intelligent & Robotic Systems, vol.74, pp.513-527, 2014. ,
Optimized link state routing protocol for ad hoc networks, Multi Topic Conference, pp.62-68, 2001. ,
URL : https://hal.archives-ouvertes.fr/inria-00471622
The dynamic source routing (DSR) protocol for mobile ad hoc networks, IETF Draft, 2003. ,
A survey on geographic routing protocols for mobile ad hoc networks, 2011. ,
Secure routing protocol design for uav ad hoc networks, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), pp.4-5, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01166852
Joint model-driven design and real experiment-based validation for a secure uav ad hoc network routing protocol, pp.1-2, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01292300
A survey of routing attacks in mobile ad hoc networks, IEEE Wireless communications, vol.14, pp.85-91, 2007. ,
Net-centric communication and control for a heterogeneous unmanned aircraft system, Journal of intelligent and Robotic Systems, vol.56, pp.199-232, 2009. ,
The sleep deprivation attack in sensor networks: Analysis and methods of defense, International Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006. ,
Combating against security attacks against mobile ad hoc networks (MANETs), Security of Self-Organizing Networks: MANET, WSN, WMN, VANET 173, pp.1-13, 2010. ,
Extended verification of secure UAANET routing protocol, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), pp.1-16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01365933
Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol.3, pp.1976-1986, 2003. ,
Collisionresistant hash function based on composition of functions, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01299415