il s'agit surtout de la vérification des fonctions de sécurité contrairement à la vérification de conception que l'on à ,
On the Fly Model Checker) : utilisé pour un protocole dans lequel des propriétés algébriques sont à vérifier ? CL-AtSe : qui est basé sur les contraintes. Il simplifie le protocole à vérifier en éliminant les états redondants par application de propriétés heuristiques ,
The avispa tool for the automated validation of internet security protocols and applications, International Conference on Computer Aided Verification, pp.281-285, 2005. ,
Improving security of autonomous uavs fleets by using new specific embedded secure elements a position paper ,
Mitigating byzantine attacks in ad hoc wireless networks, 2004. ,
Securing the olsr protocol, Proceedings of Med-Hoc-Net, pp.25-27, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00070513
Adaptive mac protocol for uav communication networks using directional antennas, Networking, Sensing and Control (ICNSC), 2010 International Conference on, pp.598-603 ,
Cross layer design for mobile ad-hoc unmanned aerial vehicle communication networks, Networking, Sensing and Control (ICNSC), 2010 International Conference on, pp.331-336 ,
Low latency routing algorithm for unmanned aerial vehicles ad-hoc networks, pp.629-635, 2011. ,
The MILS architecture for high-assurance embedded systems, International journal of embedded systems, vol.2, pp.3-4239, 2006. ,
Sensor deployment for failure diagnosis in networked aerial robots : a satisfiability-based approach, Theory and Applications of Satisfiability Testing?SAT 2007, pp.369-376 ,
Heap : hop-by-hop efficient authentication protocol for mobile ad-hoc networks, Proceedings of the 2007 spring simulaiton multiconference, pp.157-165, 2007. ,
Simple Password-Based Encrypted Key Exchange Protocols, Cryptographers' Track at the RSA Conference, pp.191-208, 2005. ,
DOI : 10.1007/978-3-540-30574-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.7550
Certification considerations for highly-integrated or complex aircraft systems, 1996. ,
A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET, Procedia Technology, vol.25, pp.264-271, 2016. ,
DOI : 10.1016/j.protcy.2016.08.106
A Comparative Study of Random Waypoint and Gauss-Markov Mobility Models in the Performance Evaluation of MANET, 2006 International Symposium on Communications and Information Technologies, pp.894-899, 2006. ,
DOI : 10.1109/ISCIT.2006.339866
On hardware-in-the-loop simulation, Proceedings of the 44th IEEE Conference on Decision and Control, pp.3194-3198, 2005. ,
DOI : 10.1109/CDC.2005.1582653
Ad hoc uav ground network (augnet), AIAA 3rd Unmanned Unlimited Technical Conference, pp.1-11, 2004. ,
Survey on low power real-time wireless MAC protocols, Journal of Network and Computer Applications, vol.75, pp.293-316, 2016. ,
DOI : 10.1016/j.jnca.2016.09.004
A mobility model for UAV ad hoc network, 2014 International Conference on Unmanned Aircraft Systems (ICUAS), pp.383-388, 2014. ,
DOI : 10.1109/ICUAS.2014.6842277
URL : https://hal.archives-ouvertes.fr/hal-00998651
NESTA: A Fast and Accurate First-Order Method for Sparse Recovery, SIAM Journal on Imaging Sciences, vol.4, issue.1, pp.1-39, 2011. ,
DOI : 10.1137/090756855
URL : http://arxiv.org/abs/0904.3367
ESTEREL: a formal method applied to avionic software development, Science of Computer Programming, vol.36, issue.1, pp.5-25, 2000. ,
DOI : 10.1016/S0167-6423(99)00015-5
URL : https://hal.archives-ouvertes.fr/hal-00579632
Systems and software verification : model-checking techniques and tools, 2013. ,
DOI : 10.1007/978-3-662-04558-9
A static analyzer for large safety-critical software, ACM SIGPLAN Notices, vol.38, issue.5, pp.196-207, 2003. ,
DOI : 10.1145/780822.781153
URL : https://hal.archives-ouvertes.fr/hal-00128135
Provably authenticated group Diffie-Hellman key exchange, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.255-264, 2001. ,
DOI : 10.1145/501983.502018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6850
Introduction to iec 61508, Proceedings of the 10th Australian workshop on Safety critical systems and software, pp.3-12 ,
DOI : 10.1177/002029400904200603
Avionics certification : A complete guide to do-178 (software), do-254 (hardware) United States, 2007. ,
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002. ,
DOI : 10.1109/EMPDP.2002.994321
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.8825
An ad-hoc network for teams of autonomous vehicles, Proceedings of the First Annual Symposium on Autonomous Intelligence Networks and Systems. Citeseer, 2002. ,
Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013. ,
DOI : 10.1016/j.adhoc.2012.12.004
Incorporating certification in feature modelling of an unmanned aerial vehicle product line, Proceedings of the 16th International Software Product Line Conference, pp.249-258, 2012. ,
Autopilots for small unmanned aerial vehicles: A survey, International Journal of Control, Automation and Systems, vol.22, issue.7???8, pp.36-44, 2010. ,
DOI : 10.1007/s12555-010-0105-z
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.6764
The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001. ,
Ad hoc wireless networking, 2013. ,
DOI : 10.1007/978-1-4613-0223-0
Suaave : Combining aerial robots and wireless networking, 25th Bristol International UAV Systems Conference, pp.1-14, 2010. ,
Performance measurement of 802.11 a wireless links from uav to ground nodes with various antenna orientations, Proceedings of 15th International Conference on Computer Communications and Networks, pp.303-308 ,
Optimized link state routing protocol (olsr), 2003. ,
DOI : 10.17487/rfc3626
URL : https://hal.archives-ouvertes.fr/inria-00471712
CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience, 2011, MILCOM 2011 Military Communications Conference, pp.2003-2010, 2011. ,
DOI : 10.1109/MILCOM.2011.6127613
Secure cooperative ad hoc applications within UAV fleets position paper, MILCOM 2009, 2009 IEEE Military Communications Conference, pp.1-7, 2009. ,
DOI : 10.1109/MILCOM.2009.5379819
URL : https://hal.archives-ouvertes.fr/hal-00406478
A comparison of MANET routing protocols on airborne tactical networks, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6, 2012. ,
DOI : 10.1109/MILCOM.2012.6415798
A Survey on Trust Management for Mobile Ad Hoc Networks, IEEE Communications Surveys & Tutorials, vol.13, issue.4, pp.562-583, 2011. ,
DOI : 10.1109/SURV.2011.092110.00088
Medium Access Control for Unmanned Aerial Vehicle (UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability, IEEE Transactions on Vehicular Technology, vol.62, issue.1, pp.390-394, 2013. ,
DOI : 10.1109/TVT.2012.2211905
Mitigating malicious control packet floods in ad hoc networks, IEEE Wireless Communications and Networking Conference, 2005, pp.2112-2117, 2005. ,
DOI : 10.1109/WCNC.2005.1424844
A system-of-systems muav remote sensing architecture for disaster response, Systems Conference 3rd Annual IEEE, pp.196-200, 2009. ,
The COQ Proof Assistant : User's Guide : Version 5, 1992. ,
Letters to the editor : go to statement considered harmful, Communications of the ACM, vol.11, issue.3, pp.147-148, 1968. ,
Routing security in wireless ad hoc networks, IEEE Communications Magazine, vol.40, issue.10, pp.70-75, 2002. ,
DOI : 10.1109/MCOM.2002.1039859
On unmanned aircraft systems issues, challenges and operational restrictions preventing integration into the National Airspace System, Progress in Aerospace Sciences, pp.503-519, 2008. ,
DOI : 10.1016/j.paerosci.2008.08.001
VANET security surveys, Computer Communications, vol.44, pp.1-13, 2014. ,
DOI : 10.1016/j.comcom.2014.02.020
Net-centric communication and control for a heterogeneous unmanned aircraft system, Journal of Intelligent and Robotic Systems, vol.56, issue.12, pp.199-232, 2009. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, Workshop on the Theory and Application of Cryptographic Techniques, pp.10-18, 1984. ,
Us secure hash algorithm 1 (sha1), 2001. ,
DOI : 10.17487/rfc3174
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8669
Best practices for developing do-178 compliant software using model-based design, AIAA Infotech@ Aerospace (I@ A) Conference, p.4566, 2013. ,
Enabling mobility in heterogeneous wireless sensor networks cooperating with UAVs for mission-critical management, IEEE Wireless Communications, vol.15, issue.6, pp.38-46, 2008. ,
DOI : 10.1109/MWC.2008.4749746
Networking issues for small unmanned aircraft systems, Journal of Intelligent and Robotic Systems, vol.54, issue.1-3, pp.21-37, 2009. ,
A Mesh in the Sky: A Routing Protocol for Airborne Networks, MILCOM 2007, IEEE Military Communications Conference, pp.1-7, 2007. ,
DOI : 10.1109/MILCOM.2007.4454819
A time-slotted on-demand routing protocol for mobile ad hoc unmanned vehicle systems, Unmanned Systems Technology IX ,
DOI : 10.1117/12.719355
Combating against security attacks against mobile ad hoc networks (manets) Security of Self-Organizing Networks : MANET, p.173, 2010. ,
Unmanned aircraft systems : Surveillance, ethics and privacy in civil applications, Computer Law & Security Review, vol.28, issue.2, pp.184-194, 2012. ,
On the resiliency of mobile ad hoc networks to MAC layer misbehavior, Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks , PE-WASUN '05, pp.160-167, 2005. ,
DOI : 10.1145/1089803.1089981
VirtualMesh : An Emulation Framework For Wireless Mesh Networks in OMNeT++, 2010. ,
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks, Computer Communications, vol.30, issue.8, pp.1841-1853, 2007. ,
DOI : 10.1016/j.comcom.2007.02.014
Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks. Security of Self-Organizing Networks, p.195, 2016. ,
Security Analysis of SHA-256 and Sisters, International Workshop on Selected Areas in Cryptography, pp.175-193, 2003. ,
DOI : 10.1007/978-3-540-24654-1_13
Security Analysis of SHA-256 and Sisters, Selected areas in cryptography, pp.175-193, 2004. ,
DOI : 10.1007/978-3-540-24654-1_13
Survey of Important Issues in UAV Communication Networks, IEEE Communications Surveys & Tutorials, vol.18, issue.2, 2015. ,
DOI : 10.1109/COMST.2015.2495297
A heuristic improvement of the bellman-ford algorithm, Applied Mathematics Letters, vol.6, issue.3, pp.3-6, 1993. ,
Netlink library (libnl), 2011. ,
Performance analysis of aodv, dsr & tora routing protocols, International Journal of Engineering and Technology, vol.2, issue.2, p.226, 2010. ,
Avionics certification : a complete guide to DO-178 (software), DO-254 (hardware) Avionics Communications, 2007. ,
Using directional antennas to prevent wormhole attacks, NDSS, 2004. ,
Mobility models for vehicular ad hoc networks: a survey and taxonomy, IEEE Communications Surveys & Tutorials, vol.11, issue.4, pp.19-41, 2009. ,
DOI : 10.1109/SURV.2009.090403
TCP/IP security threats and attack methods, Computer Communications, vol.22, issue.10, pp.885-897, 1999. ,
DOI : 10.1016/S0140-3664(99)00064-X
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, pp.175-192, 2003. ,
DOI : 10.1016/S1570-8705(03)00019-2
The swarming micro air vehicle network (smavnet) project, 2015. ,
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.249-256, 2007. ,
DOI : 10.1109/AINAW.2007.336
Immunizing the saodv protocol against routing information disclosure, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.330-334, 2011. ,
The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5 ,
DOI : 10.1109/32.588521
A survey of secure wireless ad hoc routing, IEEE Security & Privacy, vol.2, issue.3, pp.28-39, 2004. ,
Internet x. 509 public key infrastructure certificate and certificate revocation list (crl) profile, 2002. ,
DOI : 10.17487/rfc3280
Rushing attacks and defense in wireless ad hoc network routing protocols, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, pp.30-40, 2003. ,
DOI : 10.1145/941311.941317
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8094
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005. ,
DOI : 10.1145/570645.570648
Monitoring of gas pipelines ??? a civil UAV application, Aircraft Engineering and Aerospace Technology, vol.77, issue.5, pp.352-360, 2005. ,
DOI : 10.1109/IGARSS.2001.977114
The dynamic source routing protocol (dsr) for mobile ad hoc networks for ipv4, 2007. ,
DOI : 10.17487/rfc4728
A survey on complex wormhole attack in wireless ad hoc networks, Proceedings of International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT'09), pp.28-29, 2009. ,
Dsr : The dynamic source routing protocol for multi-hop wireless ad hoc networks, Ad hoc networking, vol.5, pp.139-172, 2001. ,
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.825-833, 2008. ,
DOI : 10.1109/INFOCOM.2008.134
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.3677
Cyber security threat analysis and modeling of an unmanned aerial vehicle system, Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp.585-590, 2012. ,
Improved generalized birthday attack, IACR Cryptology ePrint Archive, p.377, 2011. ,
Performance comparison of aodv, dsdv, dsr and tora routing protocols in manets, International Research Journal of Applied and Basic Sciences, vol.3, issue.7, pp.1429-1436, 2012. ,
The clustering algorithm of uav networking in near-space, Antennas, Propagation and EM Theory, 2008. ,
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000. ,
DOI : 10.1145/345910.345953
A review of current routing attacks in mobile ad hoc networks, International Journal of Computer Science and Security, vol.2, issue.3, pp.18-29, 2008. ,
A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, vol.14, issue.5, pp.85-91, 2007. ,
DOI : 10.1109/MWC.2007.4396947
Mobility Models for UAV Group Reconnaissance Applications, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), pp.33-33, 2006. ,
DOI : 10.1109/ICWMC.2006.63
Geographical Routing With Location Service in Intermittently Connected MANETs, IEEE Transactions on Vehicular Technology, vol.60, issue.2, pp.592-604, 2011. ,
DOI : 10.1109/TVT.2010.2091658
Black hole and greyhole attack in wireless mesh network, p.41, 2014. ,
Selfish MAC layer misbehavior in wireless networks, IEEE transactions on mobile computing, pp.502-516, 2005. ,
DOI : 10.1109/TMC.2005.71
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2334
Building embedded linux distributions with bitbake and openembedded, Proceedings of the Free and Open Source Software Developers' European Meeting (FOSDEM), 2005. ,
Broadband wireless access and local networks : mobile WiMAX and WiFi, 2008. ,
Cross layer optimization for cooperative mobile adhoc uav network, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.367, 2012. ,
Spread : Enhancing data confidentiality in mobile ad hoc networks, INFOCOM 2004. Twenty-third BIBLIOGRAPHIE ,
Path Vector Face Routing: Geographic Routing with Local Face Information, 13TH IEEE International Conference on Network Protocols (ICNP'05), 2005. ,
DOI : 10.1109/ICNP.2005.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.497
A soldier-robot ad hoc network, Pervasive Computing and Communications Workshops PerCom Workshops' 07. Fifth Annual IEEE International Conference on, pp.558-563, 2007. ,
Formalising UML State Machines for Model Checking, International Conference on the Unified Modeling Language, pp.430-444, 1999. ,
DOI : 10.1007/3-540-46852-8_31
Structural coverage criteria for LUSTRE/SCADE programs, Software Testing, Verification and Reliability, vol.8, issue.4, pp.133-154, 2009. ,
DOI : 10.1016/S0022-0000(74)80043-7
URL : https://hal.archives-ouvertes.fr/hal-01424792
Improving routing in networks of uavs via scoped flooding and mobility prediction, Wireless Days (WD), 2012 IFIP, pp.1-6, 2012. ,
A novel geographic position mobility oriented routing strategy for uavs, Journal of Computational Information Systems, vol.8, issue.2, pp.709-716, 2012. ,
A geographic mobility prediction routing protocol for Ad Hoc UAV Network, 2012 IEEE Globecom Workshops, pp.1597-1602, 2012. ,
DOI : 10.1109/GLOCOMW.2012.6477824
Communication architectures and protocols for networking unmanned aerial vehicles, Globecom Workshops (GC Wkshps), 2013 IEEE, pp.1415-1420, 2013. ,
SEAR, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.325-340, 2009. ,
DOI : 10.1145/1368310.1368339
Mapping quickly and with accuracy, GeoInformatics, vol.18, issue.6, p.6, 2015. ,
Mobile ad hoc networking (manet) : Routing protocol performance issues and evaluation considerations, 1999. ,
An Integrated Routing and Medium Access Control Framework for Surveillance Networks of Mobile Devices, International Conference on Distributed Computing and Networking, pp.315-327, 2011. ,
DOI : 10.1007/978-3-642-17679-1_28
The great reconnaissance : A uav project in niger, GeoInformatics, vol.17, issue.6, p.6, 2014. ,
Unmanned aerial systems and international civil aviation organization regulations, NDL Rev, vol.85, p.693, 2009. ,
Vision and Control for UAVs: A Survey of General Methods andof Inexpensive Platforms for Infrastructure Inspection, Sensors, vol.14, issue.7, pp.14887-14916, 2015. ,
DOI : 10.1061/(ASCE)1076-0342(2008)14:1(52)
The use of hmac-md5-96 within esp and ah, 1998. ,
DOI : 10.17487/rfc2403
Cooperation enforcement schemes for manets : A survey, Wireless Communications and Mobile Computing, vol.6, issue.3, pp.319-332, 2006. ,
The fuzzy vault for fingerprints is vulnerable to brute force attack. arXiv preprint, 2007. ,
Network time protocol (ntp), Network, 1985. ,
Fundamentals of cellular network planning and optimisation : 2G/2.5 G/3G... evolution to 4G, 2004. ,
Testing or Formal Verification: DO-178C Alternatives and Industrial Experience, IEEE Software, vol.30, issue.3, pp.50-57, 2013. ,
DOI : 10.1109/MS.2013.43
Extended verification of secure UAANET routing protocol, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), pp.1-16, 2016. ,
DOI : 10.1109/DASC.2016.7777970
URL : https://hal.archives-ouvertes.fr/hal-01365933
How to improve routing protocol security in a rpas swarm, 4th AETOS International Workshop on " Research Challenges for Future RPAS/UAV Systems, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01362115
Survey on uaanet routing protocols and network security challenges Ad Hoc & Sensor Wireless Networks, 2017. ,
Survey on uaanet routing protocols and network security challenges, Adhoc -Sensors Networks, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01465993
Analysis of wormhole intrusion attacks in MANETS, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008. ,
DOI : 10.1109/MILCOM.2008.4753176
Emulation-Based Performance Evaluation of Routing Protocols for Uaanets, Communication Technologies for Vehicles, pp.227-240, 2015. ,
DOI : 10.1007/978-3-319-17765-6_20
URL : https://hal.archives-ouvertes.fr/hal-01132516
A survey on position-based routing in mobile ad hoc networks, IEEE Network, vol.15, issue.6, pp.30-39, 2001. ,
DOI : 10.1109/65.967595
A Robust Localization in Wireless Sensor Networks against Wormhole Attack, Journal of Networks, vol.7, issue.1, pp.187-194, 2012. ,
DOI : 10.4304/jnw.7.1.187-194
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication, International Workshop on Cryptographic Hardware and Embedded Systems, pp.364-376, 2001. ,
DOI : 10.1007/3-540-44709-1_30
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), pp.32-46, 2008. ,
DOI : 10.1109/ICNICONSMCL.2006.202
Isabelle/HOL : a proof assistant for higher-order logic, volume 2283, 2002. ,
DOI : 10.1007/3-540-45949-9
Collision-resistant hash function based on composition of functions. arXiv preprint, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01299415
IEEE 802.11 handbook : a designer's companion, IEEE Standards Association, 2005. ,
Topology broadcast based on reverse-path forwarding (tbrpf). draft-ietf- manettbrpf-05, 2002. ,
Dsdv routing over a multihop wireless network of mobile computers, Ad hoc networking, pp.53-74 ,
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification, International Conference on Network Security and Applications, pp.152-163, 2010. ,
DOI : 10.1007/978-3-642-14478-3_16
Rfc 3561-ad hoc ondemand distance vector (aodv) routing, Internet RFCs, pp.1-38, 2003. ,
DOI : 10.17487/rfc3561
Ad hoc ondemand distance vector (aodv) routing, 2003. ,
DOI : 10.17487/rfc3561
Performance evaluation of manet routing protocols, International Journal of Computer Science Issues (IJCSI), vol.9, issue.4, p.2012 ,
Kerckhoffs' principle. In Encyclopedia of cryptography and security, pp.675-675, 2011. ,
Fisheye state routing : A routing scheme for ad hoc wireless networks, Communications, 2000. ,
Secure routing for mobile ad hoc networks, the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.193-204, 2002. ,
Packet leashes : A defense against wormhole attacks in wireless ad hoc networks, IEEE INFOCOM, pp.1976-1986, 2003. ,
Analyse du cycle de vie : Comment choisir un logiciel, 2008. ,
Complying with do-178c and do-331 using model-based design, MathWorks, Inc, pp.12-0090, 2012. ,
Defending against Wormhole Attack in MANET, 2015 Fifth International Conference on Communication Systems and Network Technologies, pp.674-678, 2015. ,
DOI : 10.1109/CSNT.2015.253
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002. ,
DOI : 10.1145/381677.381696
TESLA Broadcast Authentication, Secure Broadcast Communication, pp.29-53, 2003. ,
DOI : 10.1007/978-1-4615-0229-6_3
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense, International Journal of Distributed Sensor Networks, vol.19, issue.2, pp.267-287, 2006. ,
DOI : 10.1109/79.985685
Benchmarking and optimisation of simulink code using real-time workshop and embedded coder for inverter and microgrid control applications, Universities Power Engineering Conference (UPEC) Proceedings of the 44th International, pp.1-5, 2009. ,
Architecture and algorithms for an ieee 802.11-based multi-channel wireless mesh network, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp.2223-2234, 2005. ,
Link quality dependent mobility strategies for distributed aerial sensor networks, GLOBECOM Workshops (GC Wkshps), pp.1783-1787, 2010. ,
DOMINO, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.84-97, 2004. ,
DOI : 10.1145/990064.990077
Developing safety-critical software : a practical guide for aviation software and DO-178C compliance, 2013. ,
The md5 message-digest algorithm, 1992. ,
DOI : 10.17487/rfc1321
Unified modeling language reference manual, the. Pearson Higher Education, 2004. ,
Speed-aware routing for UAV ad-hoc networks, 2013 IEEE Globecom Workshops (GC Wkshps), pp.1367-1373, 2013. ,
DOI : 10.1109/GLOCOMW.2013.6825185
Diagnosing wireless packet losses in 802 Separating collision from weak signal, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008. ,
Deployable aerial communication networks, Proceedings of the 9th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, PE-WASUN '12, pp.9-16, 2012. ,
DOI : 10.1145/2387027.2387030
Networking models in flying ad-hoc networks (fanets ) : Concepts and challenges, Journal of Intelligent & Robotic Systems, vol.74, issue.12, pp.513-527, 2014. ,
Public-key cryptography, 2013. ,
Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991. ,
DOI : 10.1007/BF00196725
URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf
Cross-Layer Cooperative MAC Protocol in Distributed Wireless Networks, IEEE Transactions on Wireless Communications, vol.10, issue.8, pp.2603-2615, 2011. ,
DOI : 10.1109/TWC.2011.060811.101196
Reputation-and trust-based systems for wireless self-organizing networks, 2010. ,
VirtualMesh: an emulation framework for wireless mesh and ad hoc networks in OMNeT++, SIMULATION, vol.1, issue.3, pp.66-81, 2011. ,
DOI : 10.1109/TWC.2002.800539
A summary of key technologies of ad hoc networks with UAV node, 2010 International Conference on Intelligent Computing and Integrated Systems, pp.944-949, 2010. ,
DOI : 10.1109/ICISS.2010.5657024
Dijkstra's algorithm. Implementing Discrete Mathematics : Combinatorics and Graph Theory with Mathematica, pp.225-227, 1990. ,
An Extension of the OMNeT++ INET Framework for Simulating Real-time Ethernet with High Accuracy, Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, pp.375-382 ,
DOI : 10.4108/icst.simutools.2011.245510
A novel cluster-based location-aided routing protocol for uav fleet networks, International Journal of Digital Content Technology and its Applications, vol.6, issue.18, p.376, 2012. ,
Authenticated routing for ad hoc networks. Selected Areas in Communications, IEEE Journal on, vol.23, issue.3, pp.598-610, 2005. ,
Combined reactive-geographic routing for unmanned aeronautical ad-hoc networks, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.820-826, 2012. ,
Uav swarm coordination using cooperative control for establishing a wireless communications backbone, Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems International Foundation for Autonomous Agents and Multiagent Systems, pp.1157-1164, 2010. ,
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.1, pp.118-129, 2008. ,
DOI : 10.1109/JSAC.2008.080111
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.391.5406
Merkle Tree Traversal in Log Space and Time, International Conference on the Theory and Applications of Cryptographic Techniques, pp.541-554, 2004. ,
DOI : 10.1007/978-3-540-24676-3_32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.7666
LODMAC: Location Oriented Directional MAC protocol for FANETs, Computer Networks, vol.83, pp.76-84, 2015. ,
DOI : 10.1016/j.comnet.2015.03.001
Prevention of Blackhole Attack in MANET, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), pp.21-21, 2007. ,
DOI : 10.1109/AUSWIRELESS.2007.61
Mise en oeuvre et évaluation d'un routeur embarqué pour l'avionique de nouvelle génération, 2013. ,
Design and development of an embedded aeronautical router with security capabilities, 2012 Integrated Communications, Navigation and Surveillance Conference, pp.1-1 ,
DOI : 10.1109/ICNSurv.2012.6218391
URL : https://hal.archives-ouvertes.fr/hal-01022283
Simulation-based comparison of aodv, olsr and hwmp protocols for flying ad hoc networks, International Conference on Next Generation Wired/Wireless Networking, pp.245-252, 2014. ,
Virtualbox : bits and bytes masquerading as machines, Linux Journal, issue.1661, 2008. ,
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless network security, pp.103-135, 2007. ,
DOI : 10.1007/978-0-387-33112-6_5
A novel mobility model based on semi-random circular movement in mobile ad hoc networks, Information Sciences, vol.180, issue.3, pp.399-413, 2010. ,
DOI : 10.1016/j.ins.2009.10.001
A Semi-Lagrangian High-Order Method for Navier???Stokes Equations, Journal of Computational Physics, vol.172, issue.2, pp.658-684, 2001. ,
DOI : 10.1006/jcph.2001.6847
A discrete stochastic process for coverage analysis of autonomous UAV networks, 2010 IEEE Globecom Workshops, pp.1777-1782, 2010. ,
DOI : 10.1109/GLOCOMW.2010.5700247
A new routing attack in mobile ad hoc networks, International Journal of Information Technology, vol.11, issue.2, pp.83-94, 2005. ,
Moca : Mobile certificate authority for wireless ad hoc networks, 2004. ,
Security in Mobile Ad Hoc Networks, IEEE wireless communications, vol.11, issue.1, pp.38-47, 2004. ,
DOI : 10.4018/978-1-59904-899-4.ch026
Detecting wormhole attacks in wireless sensor networks using hop count analysis, International Journal on Smart Sensing & Intelligent Systems, vol.6, issue.1, p.2013 ,
Securing ad hoc routing protocols, Proceedings of the 1st ACM workshop on Wireless security, pp.1-10, 2002. ,
CSMA/CA performance under high traffic conditions: throughput and delay analysis, Computer Communications, vol.25, issue.3, pp.313-321, 2002. ,
DOI : 10.1016/S0140-3664(01)00369-3
Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.106-107, 2002. ,
Key management in wireless mesh networks. book chapter, Wireless Mesh Networks, pp.323-346, 2008. ,
Mac for dedicated short range communications in intelligent transport system, IEEE Communications Magazine, vol.41, issue.12, pp.60-67, 2003. ,
The application and improvement of temporally ordered routing algorithm in swarm network with unmanned aerial vehicle nodes, ICWMC 2013, The Ninth International Conference on Wireless and Mobile Communications, 2013. ,
Research and implementation of rsa algorithm for encryption and decryption, Strategic Technology (IFOST), 2011 6th International Forum on, pp.1118-1121, 2011. ,
A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks, 2014 International Conference on Information and Communications Technologies (ICT 2014), p.2014, 2014. ,
DOI : 10.1049/cp.2014.0575
Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems, 2004. ,
Mobility prediction clustering algorithm for UAV networking, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.1158-1161, 2011. ,
DOI : 10.1109/GLOCOMW.2011.6162360
Preliminary Study of Routing and Date Integrity in Mobile Ad Hoc UAV Network, 2008 International Conference on Apperceiving Computing and Intelligence Analysis, 2008. ,
DOI : 10.1109/ICACIA.2008.4770039
Flying Ad-Hoc Networks (FANETs): A survey, Ad Hoc Networks, pp.1254-1270, 2013. ,
DOI : 10.1016/j.adhoc.2012.12.004