. Ici, il s'agit surtout de la vérification des fonctions de sécurité contrairement à la vérification de conception que l'on à

?. Ofmc, On the Fly Model Checker) : utilisé pour un protocole dans lequel des propriétés algébriques sont à vérifier ? CL-AtSe : qui est basé sur les contraintes. Il simplifie le protocole à vérifier en éliminant les états redondants par application de propriétés heuristiques

A. Bibliographie, D. Armando, Y. Basin, Y. Boichut, L. Chevalier et al., The avispa tool for the automated validation of internet security protocols and applications, International Conference on Computer Aided Verification, pp.281-285, 2005.

[. Akram, P. Bonnefoi, S. Chaumette, K. Markantonakis, and D. Sauveron, Improving security of autonomous uavs fleets by using new specific embedded secure elements a position paper

R. Awerbuch, D. Curtmola, C. Holmer, H. Nita-rotaru, and . Rubens, Mitigating byzantine attacks in ad hoc wireless networks, 2004.

C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler et al., Securing the olsr protocol, Proceedings of Med-Hoc-Net, pp.25-27, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00070513

A. Ilah, A. , and L. Dong, Adaptive mac protocol for uav communication networks using directional antennas, Networking, Sensing and Control (ICNSC), 2010 International Conference on, pp.598-603

A. Ilah, A. , and L. Dong, Cross layer design for mobile ad-hoc unmanned aerial vehicle communication networks, Networking, Sensing and Control (ICNSC), 2010 International Conference on, pp.331-336

A. Ilah, A. , and L. Dong, Low latency routing algorithm for unmanned aerial vehicles ad-hoc networks, pp.629-635, 2011.

[. Alves-foss, W. Paul, C. Oman, S. Taylor, and . Harrison, The MILS architecture for high-assurance embedded systems, International journal of embedded systems, vol.2, pp.3-4239, 2006.

A. Fadi, N. Aloul, and . Kandasamy, Sensor deployment for failure diagnosis in networked aerial robots : a satisfiability-based approach, Theory and Applications of Satisfiability Testing?SAT 2007, pp.369-376

R. Akbani, T. Korkmaz, and G. Raju, Heap : hop-by-hop efficient authentication protocol for mobile ad-hoc networks, Proceedings of the 2007 spring simulaiton multiconference, pp.157-165, 2007.

M. Abdalla and D. Pointcheval, Simple Password-Based Encrypted Key Exchange Protocols, Cryptographers' Track at the RSA Conference, pp.191-208, 2005.
DOI : 10.1007/978-3-540-30574-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.7550

S. Arp, Certification considerations for highly-integrated or complex aircraft systems, 1996.

K. Arathy and C. Sminesh, A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET, Procedia Technology, vol.25, pp.264-271, 2016.
DOI : 10.1016/j.protcy.2016.08.106

[. Ariyakhajorn, P. Wannawilai, and C. Sathitwiriyawong, A Comparative Study of Random Waypoint and Gauss-Markov Mobility Models in the Performance Evaluation of MANET, 2006 International Symposium on Communications and Information Technologies, pp.894-899, 2006.
DOI : 10.1109/ISCIT.2006.339866

M. Bacic, On hardware-in-the-loop simulation, Proceedings of the 44th IEEE Conference on Decision and Control, pp.3194-3198, 2005.
DOI : 10.1109/CDC.2005.1582653

X. Timothy, B. Brown, C. Argrow, S. Dixon, R. Doshi et al., Ad hoc uav ground network (augnet), AIAA 3rd Unmanned Unlimited Technical Conference, pp.1-11, 2004.

[. Bartolomeu, M. Alam, J. Ferreira, and J. Fonseca, Survey on low power real-time wireless MAC protocols, Journal of Network and Computer Applications, vol.75, pp.293-316, 2016.
DOI : 10.1016/j.jnca.2016.09.004

[. Bouachir, A. Abrassart, F. Garcia, and N. Larrieu, A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp.383-388, 2014.
DOI : 10.1109/ICUAS.2014.6842277

URL : https://hal.archives-ouvertes.fr/hal-00998651

S. Becker, J. Bobin, and E. J. Candès, NESTA: A Fast and Accurate First-Order Method for Sparse Recovery, SIAM Journal on Imaging Sciences, vol.4, issue.1, pp.1-39, 2011.
DOI : 10.1137/090756855

URL : http://arxiv.org/abs/0904.3367

A. Berry, X. Bouali, E. Fornari, E. Ledinot, R. Nassor et al., ESTEREL: a formal method applied to avionic software development, Science of Computer Programming, vol.36, issue.1, pp.5-25, 2000.
DOI : 10.1016/S0167-6423(99)00015-5

URL : https://hal.archives-ouvertes.fr/hal-00579632

M. Bérard, A. Bidoit, F. Finkel, A. Laroussinie, L. Petit et al., Systems and software verification : model-checking techniques and tools, 2013.
DOI : 10.1007/978-3-662-04558-9

B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne et al., A static analyzer for large safety-critical software, ACM SIGPLAN Notices, vol.38, issue.5, pp.196-207, 2003.
DOI : 10.1145/780822.781153

URL : https://hal.archives-ouvertes.fr/hal-00128135

O. Bresson, D. Chevassut, J. Pointcheval, and . Quisquater, Provably authenticated group Diffie-Hellman key exchange, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.255-264, 2001.
DOI : 10.1145/501983.502018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6850

R. Bell, Introduction to iec 61508, Proceedings of the 10th Australian workshop on Safety critical systems and software, pp.3-12
DOI : 10.1177/002029400904200603

T. Baghai and V. Hildeman, Avionics certification : A complete guide to do-178 (software), do-254 (hardware) United States, 2007.

S. Buchegger and J. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002.
DOI : 10.1109/EMPDP.2002.994321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.8825

B. Bellur, F. Lewis, and . Templin, An ad-hoc network for teams of autonomous vehicles, Proceedings of the First Annual Symposium on Autonomous Intelligence Networks and Systems. Citeseer, 2002.

I. Bekmezci and O. K. Sahingoz, Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013.
DOI : 10.1016/j.adhoc.2012.12.004

T. Rosana, . Braga, . Onofre-trindade-jr, R. Kalinka, J. Branco et al., Incorporating certification in feature modelling of an unmanned aerial vehicle product line, Proceedings of the 16th International Software Product Line Conference, pp.249-258, 2012.

[. Chao, Y. Cao, and Y. Chen, Autopilots for small unmanned aerial vehicles: A survey, International Journal of Control, Automation and Systems, vol.22, issue.7???8, pp.36-44, 2010.
DOI : 10.1007/s12555-010-0105-z

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.6764

I. Cervesato, The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001.

X. Cheng, X. Huang, and D. Du, Ad hoc wireless networking, 2013.
DOI : 10.1007/978-1-4613-0223-0

. Chj-+-10-]-stephen-cameron, . Hailes, . Julier, . Mcclean, . Parr et al., Suaave : Combining aerial robots and wireless networking, 25th Bristol International UAV Systems Conference, pp.1-14, 2010.

[. Cheng, P. Hsiao, D. Kung, and . Vlah, Performance measurement of 802.11 a wireless links from uav to ground nodes with various antenna orientations, Proceedings of 15th International Conference on Computer Communications and Networks, pp.303-308

T. Clausen and P. Jacquet, Optimized link state routing protocol (olsr), 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

. Chaumette, C. Laplace, . Mazel, . Mirault, Y. Dunand et al., CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience, 2011, MILCOM 2011 Military Communications Conference, pp.2003-2010, 2011.
DOI : 10.1109/MILCOM.2011.6127613

[. Chaumette, R. Laplace, C. Mazel, and A. Godin, Secure cooperative ad hoc applications within UAV fleets position paper, MILCOM 2009, 2009 IEEE Military Communications Conference, pp.1-7, 2009.
DOI : 10.1109/MILCOM.2009.5379819

URL : https://hal.archives-ouvertes.fr/hal-00406478

[. Cheng and S. Moore, A comparison of MANET routing protocols on airborne tactical networks, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6, 2012.
DOI : 10.1109/MILCOM.2012.6415798

J. Cho, A. Swami, and R. Chen, A Survey on Trust Management for Mobile Ad Hoc Networks, IEEE Communications Surveys & Tutorials, vol.13, issue.4, pp.562-583, 2011.
DOI : 10.1109/SURV.2011.092110.00088

F. R. Cai, Y. Li, Y. Zhou, and L. Lamont, Medium Access Control for Unmanned Aerial Vehicle (UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability, IEEE Transactions on Vehicular Technology, vol.62, issue.1, pp.390-394, 2013.
DOI : 10.1109/TVT.2012.2211905

S. Desilva, V. Rajendra, and . Boppana, Mitigating malicious control packet floods in ad hoc networks, IEEE Wireless Communications and Networking Conference, 2005, pp.2112-2117, 2005.
DOI : 10.1109/WCNC.2005.1424844

. Airshield, A system-of-systems muav remote sensing architecture for disaster response, Systems Conference 3rd Annual IEEE, pp.196-200, 2009.

G. Dowek, A. Felty, H. Herbelin, G. Huet, C. Murthy et al., The COQ Proof Assistant : User's Guide : Version 5, 1992.

W. Edsger and . Dijkstra, Letters to the editor : go to statement considered harmful, Communications of the ACM, vol.11, issue.3, pp.147-148, 1968.

H. Deng, W. Li, P. Dharma, and . Agrawal, Routing security in wireless ad hoc networks, IEEE Communications Magazine, vol.40, issue.10, pp.70-75, 2002.
DOI : 10.1109/MCOM.2002.1039859

K. Dalamagkidis, L. Valavanis, and . Piegl, On unmanned aircraft systems issues, challenges and operational restrictions preventing integration into the National Airspace System, Progress in Aerospace Sciences, pp.503-519, 2008.
DOI : 10.1016/j.paerosci.2008.08.001

R. Gilles-engoulou, M. Bellaïche, S. Pierre, and A. Quintero, VANET security surveys, Computer Communications, vol.44, pp.1-13, 2014.
DOI : 10.1016/j.comcom.2014.02.020

W. Eric, D. Frew, P. Lawrence, B. Gray, and . Argrow, Net-centric communication and control for a heterogeneous unmanned aircraft system, Journal of Intelligent and Robotic Systems, vol.56, issue.12, pp.199-232, 2009.

T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, Workshop on the Theory and Application of Cryptographic Techniques, pp.10-18, 1984.

D. Eastlake and P. Jones, Us secure hash algorithm 1 (sha1), 2001.
DOI : 10.17487/rfc3174

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8669

G. Raymond, G. Estrada, E. Sasaki, and . Dillaber, Best practices for developing do-178 compliant software using model-based design, AIAA Infotech@ Aerospace (I@ A) Conference, p.4566, 2013.

L. Aysegul-tuysuz-erman, P. Van-hoesel, J. Havinga, and . Wu, Enabling mobility in heterogeneous wireless sensor networks cooperating with UAVs for mission-critical management, IEEE Wireless Communications, vol.15, issue.6, pp.38-46, 2008.
DOI : 10.1109/MWC.2008.4749746

W. Eric, . Frew, X. Timothy, and . Brown, Networking issues for small unmanned aircraft systems, Journal of Intelligent and Robotic Systems, vol.54, issue.1-3, pp.21-37, 2009.

B. Fu, A. Luiz, and . Dasilva, A Mesh in the Sky: A Routing Protocol for Airborne Networks, MILCOM 2007, IEEE Military Communications Conference, pp.1-7, 2007.
DOI : 10.1109/MILCOM.2007.4454819

J. Hope-forsmann, E. Robert, J. Hiromoto, and . Svoboda, A time-slotted on-demand routing protocol for mobile ad hoc unmanned vehicle systems, Unmanned Systems Technology IX
DOI : 10.1117/12.719355

Z. Muhammad-fadlullah, T. Taleb, and M. Schöller, Combating against security attacks against mobile ad hoc networks (manets) Security of Self-Organizing Networks : MANET, p.173, 2010.

L. Rachel, D. Finn, and . Wright, Unmanned aircraft systems : Surveillance, ethics and privacy in civil applications, Computer Law & Security Review, vol.28, issue.2, pp.184-194, 2012.

L. Guang and C. Assi, On the resiliency of mobile ad hoc networks to MAC layer misbehavior, Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks , PE-WASUN '05, pp.160-167, 2005.
DOI : 10.1145/1089803.1089981

R. Gantenbein, VirtualMesh : An Emulation Framework For Wireless Mesh Networks in OMNeT++, 2010.

L. Guang, C. Assi, and Y. Ye, DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks, Computer Communications, vol.30, issue.8, pp.1841-1853, 2007.
DOI : 10.1016/j.comcom.2007.02.014

V. Gokhale, A. Ghosh, and . Gupta, Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks. Security of Self-Organizing Networks, p.195, 2016.

H. Gilbert and H. Handschuh, Security Analysis of SHA-256 and Sisters, International Workshop on Selected Areas in Cryptography, pp.175-193, 2003.
DOI : 10.1007/978-3-540-24654-1_13

H. Gilbert and H. Handschuh, Security Analysis of SHA-256 and Sisters, Selected areas in cryptography, pp.175-193, 2004.
DOI : 10.1007/978-3-540-24654-1_13

L. Gupta, R. Jain, and G. Vaszkun, Survey of Important Issues in UAV Communication Networks, IEEE Communications Surveys & Tutorials, vol.18, issue.2, 2015.
DOI : 10.1109/COMST.2015.2495297

V. Andrew, T. Goldberg, and . Radzik, A heuristic improvement of the bellman-ford algorithm, Applied Mathematics Letters, vol.6, issue.3, pp.3-6, 1993.

]. Gra and . Graf, Netlink library (libnl), 2011.

K. Anuj, H. Gupta, . Sadawarti, and . Verma, Performance analysis of aodv, dsr & tora routing protocols, International Journal of Engineering and Technology, vol.2, issue.2, p.226, 2010.

V. Hilderman and T. Baghi, Avionics certification : a complete guide to DO-178 (software), DO-254 (hardware) Avionics Communications, 2007.

L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, NDSS, 2004.

J. Harri, F. Filali, and C. Bonnet, Mobility models for vehicular ad hoc networks: a survey and taxonomy, IEEE Communications Surveys & Tutorials, vol.11, issue.4, pp.19-41, 2009.
DOI : 10.1109/SURV.2009.090403

B. Harris and R. Hunt, TCP/IP security threats and attack methods, Computer Communications, vol.22, issue.10, pp.885-897, 1999.
DOI : 10.1016/S0140-3664(99)00064-X

[. Hu, B. David, A. Johnson, and . Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, pp.175-192, 2003.
DOI : 10.1016/S1570-8705(03)00019-2

[. Hauert, S. Leven, J. Zufferey, and D. Floreano, The swarming micro air vehicle network (smavnet) project, 2015.

[. Hyland, E. Barry, R. O. Mullins, . Baldwin, A. Michael et al., Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.249-256, 2007.
DOI : 10.1109/AINAW.2007.336

A. Ayman, . Hanafy, H. Sherif, M. A. Noureldin, and . Azer, Immunizing the saodv protocol against routing information disclosure, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.330-334, 2011.

G. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5
DOI : 10.1109/32.588521

A. Hu and . Perrig, A survey of secure wireless ad hoc routing, IEEE Security & Privacy, vol.2, issue.3, pp.28-39, 2004.

[. Housley, W. Polk, D. Ford, and . Solo, Internet x. 509 public key infrastructure certificate and certificate revocation list (crl) profile, 2002.
DOI : 10.17487/rfc3280

[. Hu, A. Perrig, B. David, and . Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.30-40, 2003.
DOI : 10.1145/941311.941317

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8094

[. Hu, A. Perrig, B. David, and . Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005.
DOI : 10.1145/570645.570648

D. Hausamann, W. Zirnig, G. Schreier, and P. Strobl, Monitoring of gas pipelines ??? a civil UAV application, Aircraft Engineering and Aerospace Technology, vol.77, issue.5, pp.352-360, 2005.
DOI : 10.1109/IGARSS.2001.977114

D. Johnson, Y. Hu, and D. Maltz, The dynamic source routing protocol (dsr) for mobile ad hoc networks for ipv4, 2007.
DOI : 10.17487/rfc4728

M. Jain and H. Kandwal, A survey on complex wormhole attack in wireless ad hoc networks, Proceedings of International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT'09), pp.28-29, 2009.

B. David, . Johnson, A. David, J. Maltz, and . Broch, Dsr : The dynamic source routing protocol for multi-hop wireless ad hoc networks, Ad hoc networking, vol.5, pp.139-172, 2001.

[. Jiang, J. Ma, W. Lou, and J. Wu, An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.825-833, 2008.
DOI : 10.1109/INFOCOM.2008.134

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.3677

Y. Ahmad, W. Javaid, . Sun, K. Vijay, M. Devabhaktuni et al., Cyber security threat analysis and modeling of an unmanned aerial vehicle system, Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp.585-590, 2012.

P. Kirchner, Improved generalized birthday attack, IACR Cryptology ePrint Archive, p.377, 2011.

M. Vajed-khiavi, S. Jamali, and S. Gudakahriz, Performance comparison of aodv, dsdv, dsr and tora routing protocols in manets, International Research Journal of Applied and Basic Sciences, vol.3, issue.7, pp.1429-1436, 2012.

L. Kesheng, Z. Jun, and Z. Tao, The clustering algorithm of uav networking in near-space, Antennas, Propagation and EM Theory, 2008.

B. Karp and H. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000.
DOI : 10.1145/345910.345953

M. A. Rashid-hafeez-khokhar, S. Ngadi, and . Mandala, A review of current routing attacks in mobile ad hoc networks, International Journal of Computer Science and Security, vol.2, issue.3, pp.18-29, 2008.

H. Kannhavong, Y. Nakayama, N. Nemoto, A. Kato, and . Jamalipour, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, vol.14, issue.5, pp.85-91, 2007.
DOI : 10.1109/MWC.2007.4396947

E. Kuiper and S. Nadjm-tehrani, Mobility Models for UAV Group Reconnaissance Applications, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), pp.33-33, 2006.
DOI : 10.1109/ICWMC.2006.63

E. Kuiper and S. Nadjm-tehrani, Geographical Routing With Location Service in Intermittently Connected MANETs, IEEE Transactions on Vehicular Technology, vol.60, issue.2, pp.592-604, 2011.
DOI : 10.1109/TVT.2010.2091658

R. Kaur and P. Singh, Black hole and greyhole attack in wireless mesh network, p.41, 2014.

P. Kyasanur, H. Nitin, and . Vaidya, Selfish MAC layer misbehavior in wireless networks, IEEE transactions on mobile computing, pp.502-516, 2005.
DOI : 10.1109/TMC.2005.71

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2334

M. Lauer, Building embedded linux distributions with bitbake and openembedded, Proceedings of the Free and Open Source Software Developers' European Meeting (FOSDEM), 2005.

L. Byeong-gi and S. Choi, Broadband wireless access and local networks : mobile WiMAX and WiFi, 2008.

Y. Li and X. Luo, Cross layer optimization for cooperative mobile adhoc uav network, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.367, 2012.

[. Lou, W. Liu, and Y. Fang, Spread : Enhancing data confidentiality in mobile ad hoc networks, INFOCOM 2004. Twenty-third BIBLIOGRAPHIE

B. Leong, S. Mitra, and B. Liskov, Path Vector Face Routing: Geographic Routing with Local Face Information, 13TH IEEE International Conference on Network Protocols (ICNP'05), 2005.
DOI : 10.1109/ICNP.2005.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.497

B. Brian, . Luu, J. Barry, . O-'brien, G. David et al., A soldier-robot ad hoc network, Pervasive Computing and Communications Workshops PerCom Workshops' 07. Fifth Annual IEEE International Conference on, pp.558-563, 2007.

J. Lilius and I. Paltor, Formalising UML State Machines for Model Checking, International Conference on the Unified Modeling Language, pp.430-444, 1999.
DOI : 10.1007/3-540-46852-8_31

A. Lakehal and I. Parissis, Structural coverage criteria for LUSTRE/SCADE programs, Software Testing, Verification and Reliability, vol.8, issue.4, pp.133-154, 2009.
DOI : 10.1016/S0022-0000(74)80043-7

URL : https://hal.archives-ouvertes.fr/hal-01424792

Y. Li, M. St-hilaire, and T. Kunz, Improving routing in networks of uavs via scoped flooding and mobility prediction, Wireless Days (WD), 2012 IFIP, pp.1-6, 2012.

L. Lin, Q. Sun, J. Li, and F. Yang, A novel geographic position mobility oriented routing strategy for uavs, Journal of Computational Information Systems, vol.8, issue.2, pp.709-716, 2012.

[. Lin, Q. Sun, S. Wang, and F. Yang, A geographic mobility prediction routing protocol for Ad Hoc UAV Network, 2012 IEEE Globecom Workshops, pp.1597-1602, 2012.
DOI : 10.1109/GLOCOMW.2012.6477824

J. Li, Y. Zhou, and L. Lamont, Communication architectures and protocols for networking unmanned aerial vehicles, Globecom Workshops (GC Wkshps), 2013 IEEE, pp.1415-1420, 2013.

M. Li, J. Zhao, Y. Walker, A. Hu, W. Perrig et al., SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.325-340, 2009.
DOI : 10.1145/1368310.1368339

B. Mancini and J. Aumont, Mapping quickly and with accuracy, GeoInformatics, vol.18, issue.6, p.6, 2015.

B. Macker, Mobile ad hoc networking (manet) : Routing protocol performance issues and evaluation considerations, 1999.

[. Martin, Y. Al-mousa, and N. Shenoy, An Integrated Routing and Medium Access Control Framework for Surveillance Networks of Mobile Devices, International Conference on Distributed Computing and Networking, pp.315-327, 2011.
DOI : 10.1007/978-3-642-17679-1_28

B. Mancini, The great reconnaissance : A uav project in niger, GeoInformatics, vol.17, issue.6, p.6, 2014.

D. Marshall, Unmanned aerial systems and international civil aviation organization regulations, NDL Rev, vol.85, p.693, 2009.

K. Máthé and L. Bu?oniu, Vision and Control for UAVs: A Survey of General Methods andof Inexpensive Platforms for Infrastructure Inspection, Sensors, vol.14, issue.7, pp.14887-14916, 2015.
DOI : 10.1061/(ASCE)1076-0342(2008)14:1(52)

C. Madson and R. Glenn, The use of hmac-md5-96 within esp and ah, 1998.
DOI : 10.17487/rfc2403

F. Giannis, P. Marias, . Georgiadis, K. Flitzanis, and . Mandalas, Cooperation enforcement schemes for manets : A survey, Wireless Communications and Mobile Computing, vol.6, issue.3, pp.319-332, 2006.

P. Mihailescu, The fuzzy vault for fingerprints is vulnerable to brute force attack. arXiv preprint, 2007.

L. Dave and . Mills, Network time protocol (ntp), Network, 1985.

R. Ajay and . Mishra, Fundamentals of cellular network planning and optimisation : 2G/2.5 G/3G... evolution to 4G, 2004.

E. Moy, H. Ledinot, V. Delseny, B. Wiels, and . Monate, Testing or Formal Verification: DO-178C Alternatives and Industrial Experience, IEEE Software, vol.30, issue.3, pp.50-57, 2013.
DOI : 10.1109/MS.2013.43

[. Maxa, M. S. , B. Mahmoud, and N. Larrieu, Extended verification of secure UAANET routing protocol, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), pp.1-16, 2016.
DOI : 10.1109/DASC.2016.7777970

URL : https://hal.archives-ouvertes.fr/hal-01365933

J. Maxa, M. Mahmoud, and N. Larrieu, How to improve routing protocol security in a rpas swarm, 4th AETOS International Workshop on " Research Challenges for Future RPAS/UAV Systems, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01362115

B. Maxa, M. Mahmoud, and N. Larrieu, Survey on uaanet routing protocols and network security challenges Ad Hoc & Sensor Wireless Networks, 2017.

J. Maxa, M. Mahmoud, and N. Larrieu, Survey on uaanet routing protocols and network security challenges, Adhoc -Sensors Networks, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01465993

M. Viren-mahajan, A. Natu, and . Sethi, Analysis of wormhole intrusion attacks in MANETS, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008.
DOI : 10.1109/MILCOM.2008.4753176

J. Maxa, G. Roudiere, and N. Larrieu, Emulation-Based Performance Evaluation of Routing Protocols for Uaanets, Communication Technologies for Vehicles, pp.227-240, 2015.
DOI : 10.1007/978-3-319-17765-6_20

URL : https://hal.archives-ouvertes.fr/hal-01132516

M. Mauve, J. Widmer, and H. Hartenstein, A survey on position-based routing in mobile ad hoc networks, IEEE Network, vol.15, issue.6, pp.30-39, 2001.
DOI : 10.1109/65.967595

[. Niu, D. Gao, S. Gao, and P. Chen, A Robust Localization in Wireless Sensor Networks against Wormhole Attack, Journal of Networks, vol.7, issue.1, pp.187-194, 2012.
DOI : 10.4304/jnw.7.1.187-194

H. Nozaki, M. Motoyama, A. Shimbo, and S. Kawamura, Implementation of RSA Algorithm Based on RNS Montgomery Multiplication, International Workshop on Cryptographic Hardware and Embedded Systems, pp.364-376, 2001.
DOI : 10.1007/3-540-44709-1_30

U. T. Hoang-lan-nguyen and . Nguyen, Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), pp.32-46, 2008.
DOI : 10.1109/ICNICONSMCL.2006.202

T. Nipkow, C. Lawrence, M. Paulson, and . Wenzel, Isabelle/HOL : a proof assistant for higher-order logic, volume 2283, 2002.
DOI : 10.1007/3-540-45949-9

R. Ndoundam and J. Sadie, Collision-resistant hash function based on composition of functions. arXiv preprint, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01299415

O. Bob, A. Hara, and . Petrick, IEEE 802.11 handbook : a designer's companion, IEEE Standards Association, 2005.

G. Richard, . Ogier, L. Fred, B. Templin, . Bellur et al., Topology broadcast based on reverse-path forwarding (tbrpf). draft-ietf- manettbrpf-05, 2002.

E. Charles, P. Perkins, and . Bhagwat, Dsdv routing over a multihop wireless network of mobile computers, Ad hoc networking, pp.53-74

B. Patel, A. Borisaniya, D. Patel, M. Patel, A. Rajarajan et al., Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification, International Conference on Network Security and Applications, pp.152-163, 2010.
DOI : 10.1007/978-3-642-14478-3_16

C. Perkins, E. Belding-royer, and S. Das, Rfc 3561-ad hoc ondemand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003.
DOI : 10.17487/rfc3561

[. Perkins, E. Belding-royer, and S. Das, Ad hoc ondemand distance vector (aodv) routing, 2003.
DOI : 10.17487/rfc3561

H. Paul and P. Das, Performance evaluation of manet routing protocols, International Journal of Computer Science Issues (IJCSI), vol.9, issue.4, p.2012

A. Fabien and . Petitcolas, Kerckhoffs' principle. In Encyclopedia of cryptography and security, pp.675-675, 2011.

[. Pei, M. Gerla, and T. Chen, Fisheye state routing : A routing scheme for ad hoc wireless networks, Communications, 2000.

P. Papadimitratos, J. Zygmunt, and . Haas, Secure routing for mobile ad hoc networks, the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.193-204, 2002.

A. Perrig, B. David, and . Johnson, Packet leashes : A defense against wormhole attacks in wireless ad hoc networks, IEEE INFOCOM, pp.1976-1986, 2003.

M. Pons, Analyse du cycle de vie : Comment choisir un logiciel, 2008.

. Potter, Complying with do-178c and do-331 using model-based design, MathWorks, Inc, pp.12-0090, 2012.

A. Patel, N. Patel, and R. Patel, Defending against Wormhole Attack in MANET, 2015 Fifth International Conference on Communication Systems and Network Technologies, pp.674-678, 2015.
DOI : 10.1109/CSNT.2015.253

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, E. David et al., SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

A. Perrig and J. Tygar, TESLA Broadcast Authentication, Secure Broadcast Communication, pp.29-53, 2003.
DOI : 10.1007/978-1-4615-0229-6_3

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, M. Kandemir et al., The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, International Journal of Distributed Sensor Networks, vol.19, issue.2, pp.267-287, 2006.
DOI : 10.1109/79.985685

A. Roscoe, G. M. Blair, and . Burt, Benchmarking and optimisation of simulink code using real-time workshop and embedded coder for inverter and microgrid control applications, Universities Power Engineering Conference (UPEC) Proceedings of the 44th International, pp.1-5, 2009.

A. Raniwala and T. Chiueh, Architecture and algorithms for an ieee 802.11-based multi-channel wireless mesh network, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp.2223-2234, 2005.

N. Sebastian-rohde, K. Goddemeier, C. Daniel, and . Wietfeld, Link quality dependent mobility strategies for distributed aerial sensor networks, GLOBECOM Workshops (GC Wkshps), pp.1783-1787, 2010.

M. Raya, J. Hubaux, and I. Aad, DOMINO, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.84-97, 2004.
DOI : 10.1145/990064.990077

B. Rierson, Developing safety-critical software : a practical guide for aviation software and DO-178C compliance, 2013.

[. Rivest, The md5 message-digest algorithm, 1992.
DOI : 10.17487/rfc1321

J. Rumbaugh, I. Jacobson, and G. Booch, Unified modeling language reference manual, the. Pearson Higher Education, 2004.

S. Rosati, K. Kru?elecki, and L. Traynard, Speed-aware routing for UAV ad-hoc networks, 2013 IEEE Globecom Workshops (GC Wkshps), pp.1367-1373, 2013.
DOI : 10.1109/GLOCOMW.2013.6825185

A. Shravan-rayanchu, D. Mishra, S. Agrawal, S. Saha, and . Banerjee, Diagnosing wireless packet losses in 802 Separating collision from weak signal, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.

L. Reynaud and T. Rasheed, Deployable aerial communication networks, Proceedings of the 9th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, PE-WASUN '12, pp.9-16, 2012.
DOI : 10.1145/2387027.2387030

. Ozgur-koray and . Sahingoz, Networking models in flying ad-hoc networks (fanets ) : Concepts and challenges, Journal of Intelligent & Robotic Systems, vol.74, issue.12, pp.513-527, 2014.

A. Salomaa, Public-key cryptography, 2013.

C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991.
DOI : 10.1007/BF00196725

URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf

[. Shan, H. Ting-cheng, and W. Zhuang, Cross-Layer Cooperative MAC Protocol in Distributed Wireless Networks, IEEE Transactions on Wireless Communications, vol.10, issue.8, pp.2603-2615, 2011.
DOI : 10.1109/TWC.2011.060811.101196

J. Sen, Reputation-and trust-based systems for wireless self-organizing networks, 2010.

T. Staub, R. Gantenbein, and T. Braun, VirtualMesh: an emulation framework for wireless mesh and ad hoc networks in OMNeT++, SIMULATION, vol.1, issue.3, pp.66-81, 2011.
DOI : 10.1109/TWC.2002.800539

L. Song and T. Huang, A summary of key technologies of ad hoc networks with UAV node, 2010 International Conference on Intelligent Computing and Integrated Systems, pp.944-949, 2010.
DOI : 10.1109/ICISS.2010.5657024

B. Skiena, Dijkstra's algorithm. Implementing Discrete Mathematics : Combinatorics and Graph Theory with Mathematica, pp.225-227, 1990.

H. Steinbach, F. Dieumo-kenfack, . Korf, C. Thomas, and . Schmidt, An Extension of the OMNeT++ INET Framework for Simulating Real-time Ethernet with High Accuracy, Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, pp.375-382
DOI : 10.4108/icst.simutools.2011.245510

N. Shi and X. Luo, A novel cluster-based location-aided routing protocol for uav fleet networks, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.376, 2012.

D. Sanzgiri, B. Laflamme, B. N. Dahill, C. Levine, E. M. Shields et al., Authenticated routing for ad hoc networks. Selected Areas in Communications, IEEE Journal on, vol.23, issue.3, pp.598-610, 2005.

L. Lamont, Combined reactive-geographic routing for unmanned aeronautical ad-hoc networks, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.820-826, 2012.

A. Sivakumar and C. Tan, Uav swarm coordination using cooperative control for establishing a wireless communications backbone, Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems International Foundation for Autonomous Agents and Multiagent Systems, pp.1157-1164, 2010.

H. Su and X. Zhang, Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.1, pp.118-129, 2008.
DOI : 10.1109/JSAC.2008.080111

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.391.5406

M. Szydlo, Merkle Tree Traversal in Log Space and Time, International Conference on the Theory and Applications of Cryptographic Techniques, pp.541-554, 2004.
DOI : 10.1007/978-3-540-24676-3_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.7666

B. Temel and I. Bekmezci, LODMAC: Location Oriented Directional MAC protocol for FANETs, Computer Networks, vol.83, pp.76-84, 2015.
DOI : 10.1016/j.comnet.2015.03.001

L. Tamilselvan and V. Sankaranarayanan, Prevention of Blackhole Attack in MANET, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), pp.21-21, 2007.
DOI : 10.1109/AUSWIRELESS.2007.61

A. Varet and . Conception, Mise en oeuvre et évaluation d'un routeur embarqué pour l'avionique de nouvelle génération, 2013.

A. Varet and N. Larrieu, Design and development of an embedded aeronautical router with security capabilities, 2012 Integrated Communications, Navigation and Surveillance Conference, pp.1-1
DOI : 10.1109/ICNSurv.2012.6218391

URL : https://hal.archives-ouvertes.fr/hal-01022283

S. Danil, . Vasiliev, S. Daniil, A. Meitis, and . Abilov, Simulation-based comparison of aodv, olsr and hwmp protocols for flying ad hoc networks, International Conference on Next Generation Wired/Wireless Networking, pp.245-252, 2014.

J. Watson, Virtualbox : bits and bytes masquerading as machines, Linux Journal, issue.1661, 2008.

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless network security, pp.103-135, 2007.
DOI : 10.1007/978-0-387-33112-6_5

W. Wang, X. Guan, B. Wang, and Y. Wang, A novel mobility model based on semi-random circular movement in mobile ad hoc networks, Information Sciences, vol.180, issue.3, pp.399-413, 2010.
DOI : 10.1016/j.ins.2009.10.001

D. Xiu and G. E. Karniadakis, A Semi-Lagrangian High-Order Method for Navier???Stokes Equations, Journal of Computational Physics, vol.172, issue.2, pp.658-684, 2001.
DOI : 10.1006/jcph.2001.6847

E. Yanmaz, C. Costanzo, C. Bettstetter, and W. Elmenreich, A discrete stochastic process for coverage analysis of autonomous UAV networks, 2010 IEEE Globecom Workshops, pp.1777-1782, 2010.
DOI : 10.1109/GLOCOMW.2010.5700247

[. Yi, Z. Dai, S. Zhang, and Y. Zhong, A new routing attack in mobile ad hoc networks, International Journal of Information Technology, vol.11, issue.2, pp.83-94, 2005.

S. Yi and R. Kravets, Moca : Mobile certificate authority for wireless ad hoc networks, 2004.

H. Luo, F. Ye, S. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks, IEEE wireless communications, vol.11, issue.1, pp.38-47, 2004.
DOI : 10.4018/978-1-59904-899-4.ch026

L. Yao, Z. Zhao, and G. Yu, Detecting wormhole attacks in wireless sensor networks using hop count analysis, International Journal on Smart Sensing & Intelligent Systems, vol.6, issue.1, p.2013

M. Guerrero, Z. , and N. Asokan, Securing ad hoc routing protocols, Proceedings of the 1st ACM workshop on Wireless security, pp.1-10, 2002.

[. Ziouva and T. Antonakopoulos, CSMA/CA performance under high traffic conditions: throughput and delay analysis, Computer Communications, vol.25, issue.3, pp.313-321, 2002.
DOI : 10.1016/S0140-3664(01)00369-3

M. Guerrero and Z. , Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002.

M. Guerrero and Z. , Key management in wireless mesh networks. book chapter, Wireless Mesh Networks, pp.323-346, 2008.

J. Zhu and S. Roy, Mac for dedicated short range communications in intelligent transport system, IEEE Communications Magazine, vol.41, issue.12, pp.60-67, 2003.

J. Du-zhai, Z. , and Y. Ren, The application and improvement of temporally ordered routing algorithm in swarm network with unmanned aerial vehicle nodes, ICWMC 2013, The Ninth International Conference on Wireless and Mobile Communications, 2013.

X. Zhou and X. Tang, Research and implementation of rsa algorithm for encryption and decryption, Strategic Technology (IFOST), 2011 6th International Forum on, pp.1118-1121, 2011.

Y. Zheng, Y. Wang, Z. Li, L. Dong, Y. Jiang et al., A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks, 2014 International Conference on Information and Communications Technologies (ICT 2014), p.2014, 2014.
DOI : 10.1049/cp.2014.0575

Y. Zhou, D. Wu, M. Scott, and . Nettles, Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems, 2004.

C. Zang and S. Zang, Mobility prediction clustering algorithm for UAV networking, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.1158-1161, 2011.
DOI : 10.1109/GLOCOMW.2011.6162360

K. Zhang, W. Zhang, and J. Zeng, Preliminary Study of Routing and Date Integrity in Mobile Ad Hoc UAV Network, 2008 International Conference on Apperceiving Computing and Intelligence Analysis, 2008.
DOI : 10.1109/ICACIA.2008.4770039

O. K. Bekmezci and . Sahingoz, Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013.
DOI : 10.1016/j.adhoc.2012.12.004