E. Yanmaz, R. Kuschnig, and C. Bettstetter, Channel measurements over 802.11a-based UAV-to-ground links, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.1280-1284, 2011.
DOI : 10.1109/GLOCOMW.2011.6162389

M. O. Cherif, S. Senouci, and B. Ducourthial, Efficient data dissemination in cooperative vehicular???networks, Wireless Communications and Mobile Computing, vol.2, issue.2, pp.1150-1160, 2013.
DOI : 10.1109/TITS.2004.842407

URL : https://hal.archives-ouvertes.fr/hal-00943014

M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. Hubaux, Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1557-1568, 2007.
DOI : 10.1109/JSAC.2007.071006

S. Ruj, M. A. Cavenaghi, Z. Huang, A. Nayak, and I. Stojmenovic, On Data-Centric Misbehavior Detection in VANETs, 2011 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2011.
DOI : 10.1109/VETECF.2011.6093096

H. Sedjelmaci, S. M. Senouci, and M. Feham, An efficient intrusion detection framework in cluster-based wireless sensor networks, Security and Communication Networks, vol.5, issue.2, pp.1211-1224, 2013.
DOI : 10.1002/sec.286

X. Haijun, P. Fang, W. Ling, and L. Hongwei, Ad hoc-based feature selection and support vector machine classifier for intrusion detection, 2007 IEEE International Conference on Grey Systems and Intelligent Services, pp.1117-1121, 2007.
DOI : 10.1109/GSIS.2007.4443446

C. Callegari, S. Vaton, and M. Pagano, A new statistical method for detecting network anomalies in TCP traffic, European Transactions on Telecommunications, vol.34, issue.4, pp.575-588, 2010.
DOI : 10.1002/ett.1432

A. Mitrokotsa and A. Karygiannis, Intrusion detection techniques in sensor networks, " in Wireless Sensor Network Security (Cryptology and Information Security Series), pp.251-272, 2008.

M. Strohmeier, V. Lenders, and I. Martinovic, On the Security of the Automatic Dependent Surveillance-Broadcast Protocol, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.1066-1087, 2014.
DOI : 10.1109/COMST.2014.2365951

K. D. Wesson, T. E. Humphreys, B. L. Evans, D. P. Shepard, J. A. Bhatti et al., Can Cryptography Secure Next Generation Air Traffic Surveillance? [Online] Available https://radionavlab.ae.utexas Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks, Proc. ION GNSS Meeting, pp.1-15, 2012.

R. Mitchell and I. Chen, Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.44, issue.5, pp.593-604, 2014.
DOI : 10.1109/TSMC.2013.2265083

E. Yanmaz, R. Kuschnig, M. Quaritsch, C. Bettstetter, and B. Rinner, On path planning strategies for networked unmanned aerial vehicles, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.212-216, 2011.
DOI : 10.1109/INFCOMW.2011.5928811

R. Lu, X. Lin, and X. S. Shen, SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks, Proc. IEEE INFOCOM, pp.1-9, 2010.

Y. Ren, M. C. Chuah, J. Yang, and Y. Chen, Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.36-42, 2010.
DOI : 10.1109/MWC.2010.5601956

D. Kuypers and M. Schinnenburg, Traffic performance evaluation of data links in TETRA and TETRAPOL, Proc. 11th Eur. Wireless Conf. Next Gener. Wireless Mobile Commun. Services, pp.1-7, 2005.

Z. Han, A. L. Swindlehurst, and K. J. Liu, Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles, IEEE Transactions on Vehicular Technology, vol.58, issue.7, pp.3533-3546, 2009.
DOI : 10.1109/TVT.2009.2015953

B. Karp and H. T. Kung, GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000.
DOI : 10.1145/345910.345953

H. Füssler, J. Widmer, M. Käsemann, M. Mauve, and H. Hartenstein, Contention-based forwarding for mobile ad hoc networks, Ad Hoc Networks, vol.1, issue.4, pp.351-369, 2003.
DOI : 10.1016/S1570-8705(03)00038-6

M. Rondinone and J. Gozalvez, Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks, Computer Networks, vol.57, issue.8, pp.1821-1837, 2013.
DOI : 10.1016/j.comnet.2013.02.019

D. P. Shepard and T. E. Humphreys, Characterization of receiver response to spoofing attacks, Proc. ION GNSS, pp.1-11, 2011.

T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, and D. Brumley, GPS software attacks, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.450-461
DOI : 10.1145/2382196.2382245

J. A. Larcom and H. Liu, Modeling and characterization of GPS spoofing, 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp.729-734
DOI : 10.1109/THS.2013.6699094

A. Kim, B. Wampler, J. Goppert, and I. Hwang, Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles, Infotech@Aerospace 2012, pp.1-30
DOI : 10.1109/TCST.2009.2026285

A. Shevtekar and N. Ansari, A router-based technique to mitigate reduction of quality (RoQ) attacks, Computer Networks, vol.52, issue.5, pp.957-970, 2008.
DOI : 10.1016/j.comnet.2007.11.015

P. Sakarindr and N. Ansari, Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks, IEEE Wireless Communications, vol.14, issue.5, pp.8-20, 2007.
DOI : 10.1109/MWC.2007.4396938

Z. Gao and N. Ansari, Tracing cyber attacks from the practical perspective, IEEE Commun. Mag, vol.43, issue.5, pp.123-131, 2005.

W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks: Attack and defense strategies, IEEE Netw. Mag, vol.20, issue.3, pp.41-47, 2006.

Y. Ren, M. C. Chuah, J. Yang, and Y. Chen, Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.36-42, 2010.
DOI : 10.1109/MWC.2010.5601956

Y. Guo, S. Schildt, T. Pogel, and L. Wolf, Detecting malicious behavior in a vehicular DTN for public transportation, Global Information Infrastructure Symposium, GIIS 2013, pp.1-8, 2013.
DOI : 10.1109/GIIS.2013.6684378

H. Wen, P. Y. Huang, J. Dyer, A. Archinal, and J. Fagan, Countermeasures for GPS signal spoofing, Proc. 18th Int, pp.1285-1290, 2005.

N. Wisitpongphan, F. Bai, P. Mudalige, V. Sadekar, and O. Tonguz, Routing in Sparse Vehicular Ad Hoc Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.25, issue.8, pp.1538-1556, 2007.
DOI : 10.1109/JSAC.2007.071005

Z. Zhang, M. Trinkle, L. Qian, and H. Li, Quickest detection of GPS spoofing attack, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6
DOI : 10.1109/MILCOM.2012.6415722

B. W. O-'hanlon, M. L. Psiaki, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, Real-Time GPS Spoofing Detection via Correlation of Encrypted Signals, Navigation, vol.5, issue.1, pp.267-278, 2013.
DOI : 10.1016/j.ijcip.2012.09.003

H. Sedjelmaci, S. M. Senouci, and M. A. Abu-rgheff, An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks, IEEE Internet of Things Journal, vol.1, issue.6, pp.570-577, 2014.
DOI : 10.1109/JIOT.2014.2366120

B. Yu, C. Xua, and B. Xiao, Detecting Sybil attacks in VANETs, Journal of Parallel and Distributed Computing, vol.73, issue.6, pp.746-756, 2013.
DOI : 10.1016/j.jpdc.2013.02.001

URL : http://hdl.handle.net/10397/19763

F. Mármol and G. Perez, TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, Journal of Network and Computer Applications, vol.35, issue.3, pp.934-941, 2012.
DOI : 10.1016/j.jnca.2011.03.028

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.303-336, 2014.
DOI : 10.1109/SURV.2013.052213.00046

B. Scholkopf and A. J. Smola, Learning With Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, 2006.

H. Sedjelmaci and S. M. Senouci, A new Intrusion Detection Framework for Vehicular Networks, 2014 IEEE International Conference on Communications (ICC), pp.538-543, 2014.
DOI : 10.1109/ICC.2014.6883374

S. Ganeriwal and M. B. Srivastava, Reputation-based framework for high integrity sensor networks, Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw, pp.66-77, 2004.
DOI : 10.1145/1029102.1029115

URL : http://www.ee.ucla.edu/~saurabh/publications/f21-ganeriwal.pdf

H. Sedjelmaci, T. Bouali, and S. M. Senouci, Detection and prevention from misbehaving intruders in vehicular networks, 2014 IEEE Global Communications Conference, pp.39-44, 2014.
DOI : 10.1109/GLOCOM.2014.7036781

]. O. Bouachir, A. Abrassart, F. Garcia, and N. Larrieu, Available: http://www.nsnam.org [44 A mobility model for UAV ad hoc network, Proc. IEEE Int. Conf. Unmanned Aircraft Syst, pp.383-388, 2014.

J. Xu and M. J. Chung, Predicting the performance of synchronous discrete event simulation, IEEE Trans. Parallel Distrib. Syst, vol.15, issue.12, pp.1130-1137, 2004.

T. H. Hai, E. Huh, M. I. Jo, S. Khalil, N. B. Bagchi et al., A lightweight intrusion detection framework for wireless sensor networks LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks, Proc. IEEE Int. Conf. Depend. Syst. Netw, pp.559-572, 2005.

R. Mitchell and I. Chen, Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems, IEEE Transactions on Reliability, vol.62, issue.1, pp.199-210, 2013.
DOI : 10.1109/TR.2013.2240891

Q. Zhang, Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.46, issue.10, pp.1429-1444, 2016.
DOI : 10.1109/TSMC.2015.2503399

C. Zhou, Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation, IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.45, issue.10, pp.1345-1360, 2015.
DOI : 10.1109/TSMC.2015.2415763

H. Sedjelmaci, S. M. Senouci, and N. Ansari, Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology, IEEE Transactions on Intelligent Transportation Systems, vol.18, issue.5, pp.1-11, 2016.
DOI : 10.1109/TITS.2016.2600370

URL : https://hal.archives-ouvertes.fr/hal-01543420

H. Sedjelmaci, S. M. Senouci, and M. Messous, How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?, 2016 IEEE Global Communications Conference (GLOBECOM), pp.1-6, 2016.
DOI : 10.1109/GLOCOM.2016.7841878

URL : https://hal.archives-ouvertes.fr/hal-01487771