Albatross. www.kickstarter.com/projects/164361630/the-albatross-uav. [Accessed 28 August 2015].
 DTN research group. sites.google.com/site/dtnresgroup/.
 Made in Oregon: The Most Secure UAV Software in the World -> 60 Minutes. www.softwarediligence.com/made-in-oregon-the-most-secure-uav-software-in-theworld- 60-minutes-video/. [Accessed 28 August 2015].
 Secure Solutions. www.xilinx.com/applications/aerospace-and-defense/secure-solutions.html. [Accessed 28 August 2015].
 SkyJack Project. samy.pl/skyjack/. [Accessed 28 August 2015].
 SkyScanner. www.laas.fr/projects/skyscanner/. [Accessed 30 December 2015].
 Solar-Storm. wiki.paparazziuav.org/wiki/Solar-Storm. [Accessed 28 August 2015].
 Global information grid (GIG) overarching policy. Department of 2003., November
 iNET Needs , version 1.0. Central Test and Evaluation Investment Program (CTEIP), May 2004.
 The ns-3 Network Simulator. www.nsnam.org, July 2009.
 112th Congress, 2nd Session, of Representatives. FAA Modernization and Reform Act of 2012, February 2012. www.gpo.gov/fdsys/pkg/CRPT-112hrpt381/pdf/ CRPT-112hrpt381.pdf.
 A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1):1–22, January 2004., , and .
 2011., , , and . Design of a flexible high performance quadcopter platform breaking the mav endurance record with laser power beaming. In Proc. IEEE/RSJ Intl. Conf. Intelligent Robots and Systems (IROS), pages 5166–5172, September
 A decentralized approach for multi-UAV multitarget tracking and surveillance. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 8389, May 2012. and .
 2005., , and . Protocol , dense mode protocol specification (PIM-DM). Internet RFC 3973, February
 Carlisle Adams and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Longman Publishing Co., Boston, MA, USA, 2nd edition, 2002.
 2009., , , and . NACK-oriented reliable multicast (NORM) transport protocol. RFC 5740, November
 Agencia Nacional de Aviacao Civil. Regulamentos Brasileiros de Aviacao Civil (RBAC), 2012. www2.anac.gov.br/biblioteca/rbha.asp.
 The EM Side—Channel(s). In , , and , editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 29–45. Springer, Berlin, Heidelberg, August 2003., , , and .
 Cryptographic Hardware and Embedded Systems –CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 2–16. Springer, Berlin, Heidelberg, September 2003., , and . Multi-channel attacks. In >, >, and >, editors,
 Network information flow. IEEE Transactions on Information Theory, 46(4):1204–1216, July 2000., , , and .
 IEEE MILCOM 2008, San Diego, CA, November 2008., , , and , CORE: A realtime network emulator.
 2nd AETOS International Conference on “Research Challenges for Future RPAS/UAV Systems,” Bordeaux, France, September 2014., , , , and . Improving security of autonomous UAVs fleets by using new specific embedded secure elements –a position paper. In
 Wireless mesh networks: a survey. Computer Networks, 47(4):445–487, 2005., , and .
Advances in Cryptology –ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30–December 4, 2003, Certificateless Public , pages 452–473. Springer, Berlin, Heidelberg, 2003. and .
 2005., , , and . Characterization of flexible wing mavs: Aeroelastic and propulsion effects on flying qualities. In Proceedings of AIAA Atmospheric Flight Mechanics Conference and Exhibit, pages 15–18, August
 Proceedings of the AIAA Infotech@Aerospace Conference, Boston, MA, August 2013., , , , , and James P.G Sterbenz. Implementation of aeronautical network protocols. In
 2000., , , , , , , , , , , and . Ongoing TCP research related to satellites. RFC 2760 (Informational), February
 1999., , and . Enhancing TCP over satellite channels using standard mechanisms. RFC 2488 (Best Current Practice), January
 , , and . TCP Congestion Control. RFC 2581 (Proposed Standard), April 1999. Obsoleted by RFC 5681, updated by RFC 3390.
 2007., , , , , , , , and . SensorFlock: An airborne wireless sensor network of micro-air vehicles. In Proceedings ACM International Conference Embedded Networked Sensor Systems, pages 117–129,
 2010. and . Adaptive MAC protocol for UAV communication networks using directional antennas. In Proc. Intl. Conf. Networking, Sensing and Control (ICNSC), pages 598–603, April
 Progress in Cryptology –AFRICACRYPT 2013, volume 7918 of Lecture Notes in Computer Science, pages 127–139. Springer, Berlin, Heidelberg, June 2013. and . Attacking AES using Bernsteins attack on modern processors. In >, >, and >, editors,
 1989., , and . Response of nesting red-tailed hawks to helicopter overflights. Condor, pages 296–299,
 Application-driven design of aerial communication networks. IEEE Communications Magazine, 52(5):129–137, May 2014., , , , , , , , , and .
 Soong, and J.C., Zhang. What will 5G be? IEEE Journal on Selected Areas in Communications, 32(6):1065–1082, June 2014., , , , , A.C.K.
 ARINC. 618-6: Air. Ground Character-Oriented Protocol Specification.
 2013., , and . From ground to aerial communication: dissecting WLAN 802.11n for the drones. In Proc. ACM MobiCom –WinTech Wksp, pages 25–32,
 2013., , , and . Characterizing 802.11n aerial communication. In Proc. ACM MobiHoc Wksp on Airborne Networks and Commun., pages 7–12, July
 2013., , , , and . Now or later? Delaying data transfer in time-critical aerial communication. In Proc. ACM CoNEXT, pages 127–132, December
 Micro aerial vehicle networks: an experimental analysis of challenges and opportunities. Communications Magazine, IEEE, 52(7):141–149, July 2014., , , , , and .
 A Review of Routing Protocols for Airborne Networks. IJIRAE, 3(2), March 2015., , , and .
 Atlantik Solar. http://www.atlantiksolar.ethz.ch/.
 The effects of asymmetry on TCP performance. Mob. Netw. Appl., 4(3):219–241, 1999., , and .
 Hagai Bar-El, The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370–382, February 2006., , , and Claire Whelan.
 New countermeasures against fault and software type confusion attacks on java cards. In > and , editors, Information Security Theory and Practice. Securing the Internet of Things, volume 8501 of Lecture Notes in Computer Science, pages 57–75, July 2014. and .
 4th Annual ACM Mobile Computing and Networking, MobiCom 1998, pages 76–84, New York, NY, USA, 1998. ACM., , , and . A distance routing effect algorithm for mobility (DREAM). In
 2003.. Multiple UAV cooperative search under collision avoidance and limited range communication constraints. In Proc. IEEE CDC, pages 25–30,
 Ilker Bekmezci, Ozgur Flying ad-hoc networks (FANET): A survey. Ad Hoc Networks, 11(3):1254–1270, May 2013., and ¸Samil Temel.
 . , privacy, and the federal–state balance. , , 09 2014. www.brookings.edu/∼/media/Research/Files/Reports/2014/09/civilian-drones-privacy/civilian_drones_privacy_bennett_NEW.pdf?la=en.
 2010. and . Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team. In IEEE Congress on Evolutionary Computation (CEC), pages 1–8, July
 2005.. Cache-timing attacks on AES. , University of Illinois at Chicago,
 AIAA Guidance, Navigation and Control Conference and Exhibit, Hilton Head, SC, August 2007., , and . Engineering safety and reliability into UAV Systems: Mitigating the ground impact hazard.
 2007., Mitigating the UAV ground impact hazard using fault-tree analysis and a fuel consumption model. M.S. Thesis, Department of Aerospace Engineering, University of Illinois at Urbana-Champaign,
 Eli|Biham and Differential fault analysis of secret key cryptosystems. In , editor, Advances in Cryptology CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 513–525. Springer, Berlin, Heidelberg, August 1997..
 2008., , , , and . Low cost wireless internet access for rural areas using tethered aerostats. In 2008 IEEE Region 10 and the Third International Conference on Industrial and Information Systems, pages 1–5, December
 Sanjit Biswas and Robert Morris. Opportunistic routing in multi-hop wireless networks. SIGCOMM Computer Communication Review, 34(1):69–74, 2004.
 Technical Report CS-2003-11, Department of Computer Science, University of Virginia, USA, 2003., , , and . IGF: A state-free robust communication protocol for wireless sensor networks.
 A method for fault detection and isolation in the integrated navigation system for UAV. Measurement Science and Technology, 17:1522–1528, 2006., , and ,
 2013. and . Air to ground sensor data distribution using IEEE 802.11n Wi-Fi network. In Proc. IEEE/AIAA Digital Avionics Sys. Conf. (DASC), pages 4B2–1–4B2–10, October
 1997., , and . On the importance of checking cryptographic protocols for faults. In , editor, Advances in Cryptology EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 37–51. Springer, Berlin, Heidelberg, May
 MANETS: an exclusive choice between use and security? Computing and Informatics. Special Issue on Interactive Multimedia and Intelligent Services in Mobile and Ubiquitous Computing (MUC), 27(5):799–821, 2008., , and .
 2001., , , , and . Performance enhancing proxies intended to mitigate link-related degradations. RFC 3135 (Informational), June
 Botterell. The common alerting protocol: an open standard 2006., warning and notification. In Proceedings of the 3rd International ISCRAM Conference, pages 497–503,
 2014., , , and . A mobility model for UAV ad hoc network. In International Conference on Unmanned Aircraft Systems (ICUAS), 2014, pages 383–388. IEEE,
 4379.. Requirements for internet hosts –communication layers. RFC 1122 (Standard), October 1989. Updated by RFCs 1349,
 1994.. T/TCP –TCP extensions for transactions functional specification. RFC 1644 (Experimental), July
 2004., , and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems –CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 16–29. Springer, Berlin, Heidelberg, August
 Measuring the effect of aircraft noise on sea birds. Environment International, 16(4):587–592, 1990..
 2004., , , , , and . Ad hoc UAV ground network (Augnet). In Proc. AIAA Unmanned Unlimited Tech. Conf., September
 2004., , , , Roshan-George Thekkekunnel, and Daniel Henkel. Ad hoc UAV ground network (augnet). In AIAA 3rd Unmanned Unlimited Technical Conference, pages 1–11,
 Proceedings of the International Telemetering Conference (ITC), San Diego, CA, October 2010., , and . Design and analysis of a 3–D Gauss- Markov mobility model for highly dynamic airborne networks. In
 2013., , , , , and . Rapidly deployable network for tactical applications: Aerial base station with opportunistic links for unattended and temporary events absolute example. In Proc. IEEE Military Commun. Conf. (MILCOM 2013), pages 1116–1120, November
 Key challenges of military tactical networking and the elusive promise of manet technology. Communications Magazine, IEEE, 44(11):39–45, 2006., , , and .
 Robotics: Science and Systems V, pages 257–264. MIT Press, 2010., , , , and . Positioning unmanned aerial vehicles as communication relays for surveillance tasks. In , , and , editors,
 2006., , , and . Maxprop: Routing for vehicle-based disruption-tolerant networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), April
 Towards autonomous micro UAV swarms. Journal of Intelligent and Robotic Systems, 61(1-4):339–353, 2011., , and .
 Delay-tolerant networking: An approach to interplanetary internet. IEEE Communications Magazine, 41(6):128–136, June 2003., , , , , , , and .
 2008., , and . Licklider transmission protocol –motivation. RFC 5325 (Informational), September
 2005., , , and M.A.G. de la Fuente. A SiFT: An efficient method for trajectory based forwarding. In 2nd International Symposium on Wireless Communication Systems, 2005, pages 135–139,
 Eric Baldwin Carr. Unmanned aerial vehicles: Examining 2013., security, privacy and regulatory issues of integration into US airspace. National Center for Policy Analysis (NCPA). Retrieved September
 Graeme Caughley. Sampling in aerial survey. The Journal of Wildlife Management, pages 605–615, 1977.
 Ann Cavoukian. Privacy and drones: Unmanned aerial vehicles. Technical report, Information and Privacy Commissioner, Ontario, Canada, August 2012.
 2007., , , , , , , and . Delay-tolerant networking architecture. RFC 4838 (Informational), April
 Proceedings of the International Telemetering Conference (ITC), Las Vegas, NV, October 2009. and . Aeronautical gateways: supporting TCP/IP-based devices and applications over modern telemetry networks. In
 Dominique Chabot and Evaluation of an off-the-shelf unmanned aircraft system for surveying flocks of geese. Waterbirds, 35(1):170–174, 2012..
 Autopilots for small unmanned aerial vehicles: A survey. Intl. Journal of, Control, Automation and Systems, 8(1):36–44, 2010., , and .
 Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 13–28. Springer, Berlin, Heidelberg, August 2003., , and . Template attacks. In , , and , editors,
 2011., , , , , , and . CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience. In 2011 –MILCOM 2011 Military Communications Conference, pages 2003–2010, November
 Proceedings of the 10th Nordic Workshop on Secure IT-systems (NordSec 2005), pages 1–12, Tartu, Estonia, October 2005. and . Some security problems raised by open multiapplication smart cards. In
 Secure Smart Embedded Devices, Platforms and Applications, pages 335–350. Springer, New York, 2014. and . Wireless sensor nodes. In Konstantinos Markantonakis and , editors,
 2012. and . A comparison ofMANET routing protocols on airborne tactical networks. In MILCOM 2012 –2012 IEEE Military Communications Conference, pages 1–6, October
 2012., , , , , and . A survey of localization in wireless sensor network. International Journal of Distributed Sensor Networks,
 Proceedings of the IEEE 10th International Workshop on the Design of Reliable Communication Networks (DRCN), pages 1–9, Ghent, Belgium, April 2014., Gardner, , , , and . Optimised heuristics for a geodiverse routing protocol. In
 Layering as optimization decomposition: A mathematical theory of network architectures. Proceedings of the IEEE, 95(1):255–312, January 2007., , , and .
 and . Autonomous aircraft with disconnectable tether, June 2, 2015. US Patent 9,045,218.
 Progress in Systems Engineering, volume 1089 of Advances in Intelligent Systems and Computing, pages 449–454. Springer International Publishing, 2015. and . Distributed processing applications for UAV/drones: A survey. In , , and , editors,
 2011. and . A UAV-based close-range rapid aerial monitoring system for emergency responses. In Proc. Intl. Conf. Unmanned Aerial Vehicle in Geomatics UAV-g, pages 247–252,
 Cisco 3845 Integrated Services Router. Specifications and technical documentation. http://www.cisco.com/en/US/products/ps5856/.
 Civil Aviation Authority, United Kingdom. Advisory circular: Unmanned aircraft and aircraft systems, 2013. www.caa.co.uk/default.aspx?CATID=1995.
 Civil Aviation Flight Safety Authority, Australia. Advisory circular: Unmanned aerial vehicle operations, design specification, maintenance and training of human resources, 2002. www.casa.gov.au/sites/g/files/net351/f/_assets/main/rules/1998casr/101/ 101c01.pdf?v=1378480833.
 Civil Aviation Flight Safety Authority, Australia. Civil aviation safety regulation part 101, 2002. www.comlaw.gov.au/Details/F2015C00567.
 Civil Aviation Flight Safety Authority, Australia. Notice of proposed rulemaking: Remotely piloted aircraft systems, May 2014. aussiewebsite.pdf.
 Civil Aviation Safety Authority, Australia. Casr part 23 - airworthiness standards for aeroplanes in the normal, utility, acrobatic or commuter category, 2013. www.casa.gov.au/standard-page/casr-part-23-airworthiness-standards-aeroplanes-normal-utility-acrobaticor-commuter?WCMS%3APWA%3A%3Apc=PARTS023f.
 2001., , and . COTS Commercial off-the-shelf benefits and burdens. The MITRE Corporation Report, March
 1995.. Protocol Design and Performance, April
 NETBLT: A high throughput transport protocol. ACM SIGCOMM Computer Communication Review, 17(5):353–359, October/November 1987., , and Lixia Zhang.
 2003. and . Optimized link state routing protocol (OLSR). RFC 3626 (Experimental), October
 Performance analysis of data transfer protocols over space communications. IEEE Transactions on Aerospace and Electronic Systems, 41(4):1200–1223, October 2005. and .
 Mapping and tracking. IEEE Robotics Automation Magazine, 16(2):22–34, June 2009., , , and .
 1999., , and , OSPF for IPv6. Internet RFC 2740, December
 Sage grouse leks on recently disturbed sites. Journal of Range Management Archives, 34(2):153–154, 1981., , and .
 1998., , , and . Do black ducks and wood ducks habituate to aircraft disturbance? The Journal of Wildlife Management, pages 1135–1142,
 Marco Conti and Silvia Giordano. Multihop ad hoc networking: The reality. Communications Magazine, IEEE, 45(4):88–95, 2007.
 Introduction to Algorithms. MIT Press, 5(3):55, 2001., , and ,
 Lecture Notes in Computer Science, pages 157–173. Springer, Berlin, Heidelberg, February 2001., , and . Statistics and secret leakage. In , editor, Financial Cryptography, volume 1962 of
 Council of the European Union. Protection of individuals with regard to processing of personal data and on the free movement of such data, 1995. http://eur-lex.europa.eu/legalcontent/ EN/TXT/PDF/?uri=CELEX:31995L0046 from=en.
 Council of the European Union. Regulation (EU) no 216/2008, 2008. eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=OJ%3AL%3A2008%3A079%3A0001%3A0049%3AEN %3APDF.
 Council of the European Union. Commission regulation (EU) no 1178/2011: Aircrew regulation –annexes i to iv –flight crew licensing (FCL) and medical (med) requirements, 2011. eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2011:311:0001:0193:EL:PDF.
 Council of the European Union. Airworthiness and Environmental Certification, 2012. Commission regulation (EU) no. 748/2012 ISBN Number: 978-92-9210-148-0.
 Council of the European Union. Air Operations, 2012. Commission regulation (EU) no. 965/2012. eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32012R0965 & from=EN.
 Council of the European Union. Part 21 Acceptable Means of Compliance and Guidance Material, 2014. Commission regulation (EU) no. 748/2012. easa.europa.eu/system/files/dfu/ Change%20Information%20to%20AMC-GM%20Part%2021%20-%20Issue%202.pdf.
 The DAISIE project. www.agence-nationale-recherche.fr/?Project=ANR-13-ASMA-0004.
 2009., , , , , , , , and . Experiment and field demonstration of a 802.11-based ground-UAV mobile ad-hoc network. In MILCOM 2009–2009 IEEE Military Communications Conference, pages 1–7. IEEE,
 2008., , , , and , MANET Multicast with Multiple Gateways. IEEE MILCOM Conference, November
 IEEE MILCOM 2012, Orlando, FL, November 2012., , , , , and , Adaptive Routing for Tactical Communications,
 1995., , and . An Evaluation of TCP Vegas by Live Emulation,
 Fundamentals of Wireless Sensor Networks: Theory and Practice. Wireless Communications and Mobile Computing. Wiley, 2010. and .
 The potential of unmanned aerial vehicle for large scale mapping of coastal area. IOP Conference Series: Earth and Environmental Science, 18(1):012031, 2014., , and .
 2007. and . A performance comparison of position-based routing approaches for mobile ad hoc networks. Vehicular Technology Conference (VTC), pages 1–5, October
 5722. and . , Version 6 (IPv6) Specification. RFC 2460 (Draft Standard), December 1998. Updated by RFCs 5095,
 2004.. Issues concerning integration of unmanned aerial vehicles in civil airspace. Technical report, MITRE, Center for Advanced Aviation System Development, McLean, Virginia,
 Delair-tech. Dt-18. www.avyon.com/dt-18/. [Accessed 28 August 2015].
 1999., , , , and . Effects of helicopter noise on Mexican spotted owls. The Journal of Wildlife Management, pages 60–76,
 deltadrone. deltadrone.com/.
 2014., , and . Delay-tolerant networking TCP convergence-layer protocol. RFC 7242 (Experimental),
 Department of Defense. Unmanned Aerial Vehicle Roadmap 2000-2025. Washington: Office of the Secretary of Defense, 2001.
 2010., , , and . Streaming H.264 scalable video over data distribution service in a wireless environment. In Proc. IEEE Intl. Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM), pages 1–3, June
 Deutsches Zentrum für Luft- und Raumfahrt. LDACS1 website. www.ldacs.com, 2015.
 DGAC. www.dgac.org/.
 Reinhard Diestel. Graph theory. 2005. Grad. Texts in Math, 2005.
 Direction Generale de l'Aviation Civile. Arrêté du 11 avril 2012 relatif a la conception des aéronefs civils qui circulent sans aucune personne à bord, aux conditions de leur emploi et sur les capacités requises des personnes qui les utilisent, May 2012. www.legifrance.gouv.fr/eli/arrete/2012/4/11/DEVA1206042A/jo/texte.
 Direction Generale de l'Aviation Civile. Arrêté du 11 avril 2012 relatif à l'utilisation de l'espace aérien par les aéronefs qui circulent sans personne à bord, May 2012. www.legifrance.gouv.fr/eli/arrete/2012/4/11/DEVA1207595A/jo/texte.
 Directive 2014/34/EU of the European Parliament and of the Council of 26 February 2014 on the harmonisation of the laws of the member states relating to equipment and protective systems intended for use in potentially explosive atmospheres. Official Journal of the European Union, 2013. pages 309–356.
 2011., Caro, , , and . Communication assisted navigation in robotic swarms: Self-organization and cooperation. In Proc. IEEE/RSJ Intl. Conf. Intelligent Robots and Systems (IROS), pages 4981–4988, September
 MobiCom ‘96: Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, pages 15–26, New York, NY, USA, November 1996. ACM Press., , and . TCP extensions for space communications. In
 2003., , and . Differential fault analysis on A.E.S. In , , and , editors, Applied Cryptography and Network Security, volume 2846 of Lecture Notes in Computer Science, pages 293–306. Springer, Berlin, Heidelberg, October
 Photogrammetrische Woche 2011, pages 135–145. Wichmann Verlag, Heidelberg, 2004.. The potential of unmanned aerial vehicles for mapping. In , editor,
 handoff and limited connectivity. IEEE Transactions on Aerospace and Electronic Systems, 41(2):489–502, April 2005., , , and Zheyin Li. Satellite transport protocol handling ,
 Free space optical communications routing performance in highly dynamic airspace environments. In Proceedings of the 2004 IEEE Aerospace Conference. volume 2, pages 1398–1406. IEEE, 2004. and .
 Next generation satellite systems for aeronautical communications. International Journal of Satellite Communications and Networking, 22(2):157–179, 2004., , and Leandros Tassiulas.
 2012., , , and . Unmanned aircraft systems for remote building inspection and monitoring. In Proc. Intl. Wksp. Structural Health Monitoring, pages 1179–1186,
 2008. and . UAV-based augmented monitoring: Real-time georeferencing and integration of video imagery with virtual globes. In Intl. Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pages 1229–1235,
 Eurocontrol. Challenges of growth 2013. www.eurocontrol.int/sites/default/files/article/ content / documents / official -documents/reports/201306-challenges-of-growth-2013-task- 4.pdf, 2013.
 European Aviation Safety Agency. Airworthiness certification of unmanned aircraft systems (UAS), 2009. easa.europa.eu/system/files/dfu/E.Y013-01_%20UAS_%20Policy.pdf.
 European Aviation Safety Agency. Annex to ed decision 2012/012/r part cs-23 normal, utility, aerobatic and commuter aeroplanes, 2012. easa.europa.eu/system/files/dfu/CS-23 %20Amdt%203.pdf.
 European Aviation Safety Agency. Concept of operations for drones: A risk based approach to regulation of unmanned aircraft, 2015. www.easa.europa.eu/system/files/dfu/204696_ EASA_concept_drone_brochure_web.pdf.
 New York, NY, USA, 1979.. Graph Algorithms. W. H. Freeman & Co.,
 FAA (website). www.faa.gov/.
 FAA. Nextgen. www.faa.gov/nextgen, 2013.
 Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ‘03, pages 27–34, New York, NY, USA, 2003. ACM.. A delay-tolerant network architecture for challenged internets. In
 2010., , and . Comparison studies of OSPF-MDR, OLSR and composite routing. In Military Communications Conference, 2010 - MILCOM 2010, pages 989–994, October
 FCC. Role of deployable aerial communications architecture in emergency communications and recommended next steps. Technical report, Federal Communications Commission (FCC), September 2011.
 FCC. Deployable aerial communications architectures (daca). www.fcc.gov/, 2013.
 Federal Aviation Administration. Systems and equipment guide for certification of part 23 airplanes and airships, 2011. www.faa.gov/documentLibrary/media/Advisory_Circular/ AC%2023-17C.pdf.
 Federal Aviation Administration. Integration of unmanned aircraft systems into the national airspace system –concept of operations, September 2012. www.suasnews.com/ wp-content/uploads/2012/10/FAA-UAS-Conops-Version-2-0-1.pdf. (retrievedMay 2016)
 Federal Aviation Administration. Operation and certification of small unmanned aircraft systems, February 2015. www.faa.gov/regulations_policies/rulemaking/recently_ published/media/2120-AJ60_NPRM_2-15-2015_joint_signature.pdf.
 High Performance Networks: Frontiers and Experience, volume 238 of Kluwer International Series in Engineering and Computer Science, Chapter 8. Kluwer Academic Publishers, Boston, MA, 1993.. An overview of the TP++ transport protocol project. In , editor,
 FEMA. Department of homeland security: National preparedness system. www.fema.gov/ pdf/prepared/nps-description.pdf, 2011.
 Sally Floyd. TCP and explicit congestion notification. SIGCOMM Comput. Commun. Rev., 24(5):8–23, 1994.
 Fly-n-Sense fly-n-sense.com/.
 Optimal packing and covering in the plane are NP-complete. Information Processing Letters, 12(3):133–137, 1981., , and .
 1989.. TCP big window and NAK options. RFC 1106, June
 2007.. , 2006/07. Pilot comments during personal communications, March/April 2007. Emails between March 20 and April 20 of
 2003., , and . Non-traditional flight safety systems and integrated vehicle health management systems. Final report, ITT Industries, Advanced Engineering and Sciences Division, 2560 Huntington Avenue, Alexandria, VA 22303, August
 2014., , , and . Hardware design and implementation of a mavlink interface for an FPGA-based autonomous UAV flight control system. In Proceedings of the 2014 Australasian Conference on Robotics and Automation, pages 1–6. Australian Robotics & Automation Association ARAA,
 A MAC/routing cross-layer approach to geographic forwarding in wireless sensor networks. Ad Hoc Netw., 5(6): 872–884, 2007., , , and .
 Cryptographic Hardware and Embedded Systems — CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 251–261. Springer, Berlin, Heidelberg, May 2001., , and . Electromagnetic analysis: Concrete results. In , , and , editors,
 2011., , and . Real-time people and vehicle detection from UAV imagery. Proc. SPIE, 7878:78780B–78780B–13,
 Stable cooperative surveillance with information flow constraints. IEEE Trans. Contr. Sys. Techn., 16(5):856–868., , and .
 Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy. The University of Chicago Press, Chicago, IL, 12 2001..
 Smart Card Research and Advanced Applications VI, volume 153 of IFIP International Federation for Information Processing, pages 159–176. Springer, US, 2004. and . A survey on fault attacks. In , , , and Anas , editors,
 1988., , and . Effects of aircraft noise and sonic booms on fish and wildlife: Results of a survey of US fish and wildlife service endangered species and ecological services field offices, refuges, hatcheries, and research centers. Technical report, DTIC Document,
 upporting wilderness search and rescue using a camera-equipped mini UAV. Journal of Field Robotics, 25(1–2):89–110, 2008., , , , , , and . S
 Google. Balloon powered internet for everyone. www.google.com/loon/how/, 2013.
 The American Heritage History of Flight. American Heritage, 1962..
 Dose-response relationships of harlequin duck behaviour to noise from low-level military jet over-flights in central Labrador. Environmental Conservation, 31(04):289–298, 2004. and .
 Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP ‘03, pages 154–165, Washington, DC, USA, May 2003. IEEE Computer Society. and . Using memory errors to attack a virtual machine. In
 GRASP Laboratory www.grasp.upenn.edu/.
 Generic evaluation methods for disaster drills in developing countries. Annals of Emergency Medicine, 41(5):689–699, 2003., , , and .
 2004.. Equivalent safety analysis using casualty expectation approach. AIAA 3rd Unmanned Unlimited Technical Conference, Workshop, and Exhibit, September
 Variations in breeding bald eagle responses to jets, light planes and helicopters. Journal of Raptor Research, 31(3):213–222, 1997. and .
 UAV aided intelligent routing for ad-hoc wireless network in single-area theater. In Proc. IEEE Wireless Commun. and Net. Conf., volume 3, 2000., , , , , and .
 Janes Aerospace Dictionary. Janes Information Group, London, England, 3 edition, 6 1988..
 A survey of 5G network: Architecture and emerging technologies. IEEE Access, 3:1206–1232, 2015. and .
 A new routing protocol for the reconfigurable wireless networks. Proc. of IEEE 6th International Conference on Universal Personal Communications 97, pp. 562–566, 1997..
 2011., , , and . Multimodal controls for soldier/swarm interaction. In 2011 RO-MAN, pages 223–228, July
 2006., , and . Field experimentation of cots-based UAV networking. In MILCOM 2006–2006 IEEE Military Communications Conference, pages 1–7, October
 Localization algorithms of wireless sensor networks: A survey. Telecommunication Systems, 52(4):2419–2436, 2013., , , , and .
 Lecture Notes in Computer Science, pages 222–235. Springer, 2012., , , and . Real-time camera tracking: When is high frame-rate best? In , , , , and , editors, ECCV (7), volume 7578 of
 5348., , , and . TCP friendly rate control (TFRC): Protocol specification. RFC 3448 (Proposed Standard), January 2003. Obsoleted by RFC
 2014., Christopher Holmquist-Johnson, and . Evaluation of the Raven SUAS to detect and monitor greater sage-grouse leks within the middle park population. Open File Report, US Geological Survey,
 Aircraft operations near concentrations of birds in Antarctica: The development of practical guidelines. Biological Conservation, 125(3):309–322, 2005..
 Hannes Hartenstein and A tutorial survey on vehicular ad hoc networks. Communications Magazine, IEEE, 46(6):164–171, 2008..
 2013. and . The vulnerability of UAVs to cyber attacks –An approach to the risk assessment. In 5th International Conference on Cyber Conflict (CyCon), pages 1–23, June
 Evolved swarming without positioning information: an application in aerial communication relay. Autonomous Robots, 26(1), 2009., J.-C. Zufferey, and .
 2015., , and . Experimental analysis of multipoint-to-point UAV communications with IEEE 802.11n and 802.11ac. In Proc. IEEE Intl. Symp. Pers. Indoor, Mobile Radio Commun. (PIMRC), August
 Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint. IEEE Communications Surveys Tutorials, 18(4):2624–2661., , and .
 Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009., , , and . On leveraging partial paths in partially-connected networks. In
 2007., , and . From images to traffic behavior –a UAV tracking and monitoring application. In Proc. Intl. Conf. Information Fusion, pages 1–8, July
 BLR: Beaconless routing algorithm for mobile ad hoc networks. Computer Communications, 27(11):1076–1086, 2004.üttel, , , and älchli.
 SIGCOMM ‘96: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 270–280, New York, NY, USA, 1996. ACM.. Improving the start-up behavior of a congestion control scheme for TCP. In
 GNSS –Global Navigation Satellite Systems: GPS, GLONASS, Galileo, and More. Springer, Vienna, 2007., , and .
 Aircraft and rotorcraft system identification: Engineering methods with flight test examples (M.B. Tischler et al., 2006) [bookshelf]. IEEE Control Systems, 28(4):101–103, Aug 2008..
 Design, performance and testing of a quad rotor biplane micro air vehicle for multi role missions. International Journal of Micro Air Vehicles, 6(3):155–173, 2014., , and Inderjit Chopra.
 Hsin-Yuan Huang, Layernet: A self-organizing protocol for small ad hoc networks. IEEE Transactions on Aerospace and Electronic Systems, 38(2):378–387, April 2002., and .
 2004., , , and . Cross-layer routing in wireless mesh networks. 1st International Symposium on Wireless Communication Systems, pages 319–323,
 ICAO (website). www.icao.int.
 ICAO. Technical provisions for mode s services and extended squitter. 2012.
 ICAO. Integration of remotely piloted aircraft systems in civil controlled airspace and selforganizing airborne networks. www.icao.int/Meetings/a38/Documents/WP/wp337_en.pdf, 2013.
 Integration of the CORE and EMANE Network Emulators, by Jeff Ahrenholz, Tom Goff, and Brian Adamson, IEEE MILCOM 2011, Baltimore, MD, November 2011.
 ICAO. Use of self organizing airborne networks to monitor commercial aircraft globally. www.icao.int/Meetings/GTM/Documents/WP.10.Russian.Use%20of%20self%20 organizing%20airborne%20networks.Revised.pdf, 2014.
 III. Civilian drones, privacy, and the federal–state balance. Technical report, Congressional Research Service, 03 2015. fas.org/sgp/crs/misc/R43965.pdf.
 International Civil Aviation Organization. Document 9713: International civil aviation vocabulary, 2007. www1.atmb.net.cn/CD_web/UploadFile/2013052810430696.pdf.
 International Civil Aviation Organization. Annex 8: Airworthiness of aircraft, July 2010. www.icao.int/safety/airnavigation/nationalitymarks/annexes_booklet_en.pdf.
 International Civil Aviation Organization. Advisory circular: Unmanned aircraft systems, 2011. http://ICAOwebsite.pdf.
 International Civil Aviation Organization. Amendment 43 to ICAO Annex 2, Rules of the Air, 2012. www.icao.int/Meetings/UAS/Documents/019e.pdf.
 2006., , , , , , , and . Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Proceedings of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP),
 2006., , , , , , , and . Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Citeseer,
 2006., , , , , , , and Stefano Baiotti. Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Citeseer,
 Proceedings of the International Telemetering Conference (ITC), San Diego, CA, October 2008., , and . A cross-layered protocol architecture for highly-dynamic multihop airborne telemetry networks. In
 Survivable millimeter-wave mesh networks. Computer Communications, 34(16):1942–1955, October 2011., , , and .
 2009., , , 43, , and . Performance comparison of weather disruption-tolerant crosslayer routing algorithms. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), pages 1143–1151, Rio de Janeiro, April
 1990.. Compressing TCP/IP Headers for low-speed serial links. RFC 1144 (Proposed Standard), February
 1992., , and . TCP Extensions for high performance. RFC 1323 (Proposed Standard), May
 2018. and . TCP extensions for long-delay paths. RFC 1072, October 1988. Obsoleted by RFCs 1323,
 Evolution of aeronautical communications for personal and multimedia services. IEEE Communications Magazine, 41(7):36–43, July 2003., , , , , , , , , and Fun Hu.
 2011., , and Kwong-Sang Yin. Analysis of l-band digital aeronautical communication systems: L-DACS1 and L-DACS2. In Aerospace Conference, 2011 IEEE, pages 1–10, March
 Japan UAV Association. Safety standards for commercial use unmanned 350 Aerial vehicle, for fixed wing aircraft, used in uninhabited areas, 2007. JUAVwebsite.pdf.
 Japan UAV Association. Safety Standards for Commercial Use Unmanned Aerial Vehicle, for FixedWing Small Aerial Vehicle, Used in Uninhabited Areas [for electrically powered], 2011. JUAVwebsite.pdf.
 2012.-Pacheco, , , , , and . Implementation of a wireless mesh network of ultra light MAVs with dynamic routing. In IEEE Globecom Wkshps, pages 1591–1596, December
 TP-satellite: A new transport protocol for satellite IP networks. IEEE Transactions on Aerospace and Electronic Systems, 45(2):502–515, April 2009., , and .
 2011, pages 446–450. IEEE, 2011., , , , , , , and . New technologies and processes for the homeland security exercise and evaluation program toolkit. In IEEE International Conference on Technologies for Homeland Security (HST),
 2007., , and . The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC 4728 (Experimental), February
 System integration and operation of a research unmanned aerial vehicle. AIAA Journal of Aerospace Computing, Information, and Communication, 1(1), January 2004. and .
 Joint Authorities for Rulemaking of Unmanned Systems WG-3 Airworthiness. Certification specification for light unmanned rotorcraft systems, October 2013. www.nlr.nl/ downloads/jarus_cs-lurs.pdf.
 Joint Authorities for Rulemaking of Unmanned Systems WG-5. RPAS C2 link. Required communication performance (C2 link RCP) concept, 2014. jarus-rpas.org/index.php/ deliverable/category/12-external-consultation-on-jarus-c2-rcp.
 Joint Aviation Authority, Administrative and Guidance Material. Airworthiness and operational approval for precision rnav operations in designated European airspace, 2000. www.eurocontrol.int/sites/default/files/content/documents/navigation/tgl-10-jaa.pdf.
 An assessment of small unmanned aerial vehicles for wildlife research. Wildlife Society Bulletin, 34(3):750–758, 2006., , and .
 . Current status of work in the field of UAS related standards in Europe, 2012. www.eurocae.net/wgs/active/?wg=WG-73.
 2009., , , , and C.-C. Yeh. Real-time video surveillance over IEEE 802.11 mesh networks. In Proc. IEEE Real-Time and Embedded Tech. and Appl. Symp., pages 205–214,
 2003. and . Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113–127,
 Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pages 243–254, New York, NY, USA, 2000. ACM. and . GPSR: Greedy perimeter stateless routing for wireless networks. In
 50th AIAA Aerospace Sciences Meeting Including the New Horizons Forum and Aerospace Exposition, Nashville, TN. January, pages 9–12, 2012., , , and . Development of the nano hummingbird: A tailless flapping wing micro air vehicle. In
 Tan. Rate control for communication networks: Shadow, prices, proportional fairness and stability. The Journal of the Operational Research Society, 49(3):237–252, March 1998., , and D.K.H.
 Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4):617–636, 2014., , , and .
 Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges. IEEE Communications Surveys Tutorials, 14(2):607–640, Second 2012., , and .
 Joseph King. For or against. Soaring Magazine, page 47, September–October 2015.
 Young-Bae Ko and Location-aided routing (LAR) in mobile ad hoc networks. Wirel. Netw., 6(4):307–321, July 2000..
 Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In >, editor, Advances in Cryptology CRYPTO 96, volume 1109 of Lecture Notes in Computer Science, pages 104–113. Springer, Berlin, Heidelberg, August 1996..
 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1999, pages 388–397, London, UK, 1999. Springer-Verlag., , and . Differential power analysis. In
 Drones and the fourth amendment: Redefining expectations of privacy. Duke LJ, 64:1129, 2014..
 Proceedings of the USENIXWorkshop on Smartcard Technology,WOST' 99, pages 9–20, Berkeley, CA, USA, 1999. USENIX Association. and . Design principles for tamper-resistant smartcard processors. In
 Special Issue of Wireless Communications and Mobile Computing, pages 533–547. Wiley Interscience Press, 2002., , , , , and . Adaptive security for multi-layer ad-hoc networks. In
 Multi-agent control algorithms for chemical cloud detection and mapping using unmanned air vehicles. In Proc. IEEE/RSJ Intl. Conf. on Intelligent Robots and Systems, volume 3, pages 2782–2788, October 2002., , , and .
 Olga Kozar. Towards better group work: Seeing the difference between cooperation and collaboration. English Teaching Forum, 48(2):16–23, 2010.
 Explicit transport error notification (ETEN) for error-prone wireless and satellite networks. Computer Networks, 46(3):343–362, 2004., , , , and Mark Allman.
 2006. and . Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors. In Twelfth International Symposium on High-Performance Computer Architecture, pages 212–221, February
 2014., , , , and . A comparison of OLSR and OSPF-MDR for large-scale airborne mobile adhoc networks. In Proceedings of the third ACM Workshop on Airborne Networks and Communications, pages 17–22. ACM,
 Rémi Laplace. Applications and DTN services for cooperative UAVs fleet. Thesis, Université Sciences et Technologies –Bordeaux I, December 2012.
 Andreas Larsson. Report on the state of the art of security in sensor networks, 2011.
 LDACS2 Project Team. LDACS2 Specification. www.eurocontrol.int/sites/default/files/ article//content/documents/communications/18062009-ldacs2-design-d3-v1.2.pdf, 2009.
 Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, Premier Reference Source, Chapter 8. Information Science Reference, Hershey, PA, USA, 2010., , and . Survey of routing protocols in vehicular ad hoc networks. In , editor,
 1963. and . Status of Attwater's prairie chicken. The Journal of Wildlife Management, pages 713–725,
 Safeware: System Safety and Computers. ACM Press, New York, NY, USA, 1995..
 Fan Li and Yu Wang. Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2):12–22, June 2007.
 Fan Li and Yu Wang. Routing in vehicular ad hoc networks: A survey. Vehicular Technology, Magazine, IEEE, 2(2):12–22, 2007.
 GRID: A fully location-aware routing protocol for mobile ad hoc networks. Telecommunication Systems, 18(1–3):37–60, 2001., , and .
 Yun-Wei Lin, Yuh-Shyan Chen, and Sing-Ling Lee. Routing protocols in vehicular ad hoc networks: A survey and future perspectives. Journal of Information Science and Engineering, 26(3):913–932, 2010.
 Construction of cubic structures with quadrotor teams. In Proc. of Robotics: Science and Systems, Los Angeles, CA, USA, June 2011., , and .
 Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12):103–109, December 2009., , , , and Jian Ma.
 The Loon project. www.google.com/loon/.
 Luftfahrt-Bundesamt. Luftverkehrs-Ordnung vom 10. August 1963 (BGBl. I S. 652), die zuletzt durch Artikel 3 des Gesetzes vom 8. Mai 2012 (BGBl. I S. 1032) gea?ndert worden List, May 2012. www.gesetze-im-internet.de/bundesrecht/luftvo/gesamt.pdf.
 2012., ed. Simplified Multicast Forwarding. RFC 6621, May
 Simplified multicast forwarding in mobile ad hoc networks. IEEE Military Communications Conference (MILCOM), Vol. 2 (2004), pp. 744–750., , and .
 Evaluation of distributed cover set algorithms in mobile ad hoc network for simplified multicast forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 11(3):1–11, 2007., , , and Brian Adamson.
 2000. and . Decentralized fault detection and diagnosis in navigation systems for unmanned aerial vehicles. In IEEE Position Locations and Navigation Symposium, March
 TCP splice for application layer proxy performance. Journal of High Speed Networks, 8(3):225–240, 1999. and Pravin Bhagwat.
 Congestion avoidance and fair event detection in wireless sensor network. IEICE Transactions on Communications, E90-B(12):3362–3372, 2007., , Md. , and .
 2012., , , , , , , , , , et al. The role of integrated modeling and simulation in disaster preparedness and emergency preparedness and response: the summit platform. In 2012 IEEE Conference on Technologies for Homeland Security (HST), pages 117–122. IEEE,
 1981. and . Aerial survey of greater prairie chicken leks. Wildlife Society Bulletin, pages 219–221,
 1996., , , and . TCP selective acknowledgment options. RFC 2018 (Proposed Standard), October
 A survey on position-based routing in mobile ad hoc networks. IEEE Network, 15(6):30–39, 2001., , and .
 David B.Mayo and Comparison of the hovering efficiency of rotating wing and flapping wing micro air vehicles. Journal of the American Helicopter Society, 55(2):25001–25001, 2010..
 2010., , , -de Dios, and . Firemen monitoring with multiple UAVs for search and rescue missions. In Proc. IEEE Intl. Wksp. Safety Security and Rescue Robotics (SSRR), pages 1–6, July
 Reliable broadband communication using a burst erasure correcting code. SIGCOMM Comput. Commun. Rev., 20(4):297–306, 1990..
 2000.. Using second-order power analysis to attack DPA resistant software. In and , editors, Cryptographic Hardware and Embedded Systems — CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 238–251. Springer, Berlin, Heidelberg, August
 Performance and scalability of mobile wireless base-station-oriented networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(2):69–79, 2003., , , and Wei-Lun Chen.
 1990. and . Path MTU discovery. RFC 1191 (Draft Standard), November
 Topics in Cryptology –CT-RSA 2012, volume 7178 of Lecture Notes in Computer Science, pages 1–18. Springer, Berlin, Heidelberg, February 2012., , and . Black-box side-channel attacks highlight the importance of countermeasures. In , editor,
 2011., , and . Estimation and control of UAV swarms for distributed monitoring tasks. In American Control Conf. (ACC), pages 1069–1075, June
 2012., , , , and . UAVNet: A mobile wireless mesh network using unmanned aerial vehicles. In Proc. IEEE Globecom Wkshps, pages 1603–1608, December
 2012., , , , and Markus Anwander. Uavnet: A mobile wireless mesh network using unmanned aerial vehicles. In Globecom Workshops (GC Wkshps), 2012 IEEE, pages 1603–1608. IEEE,
 Malicious code on Java card smartcards: Attacks and countermeasures. In Gilles Grimaud and François-Xavier Standaert, editors, Smart Card Research and Advanced Applications, volume 5189 of Lecture Notes in Computer Science, pages 1–16. Springer, Berlin, Heidelberg, September 2008. and .
 5709.. OSPF Version 2. RFC 2328 (Standard), April 1998. Updated by RFC
 Techniques of side channel cryptanalysis. 2001. Master's thesis, Master of Mathematics in Combinatorics and Optimization, University of Waterloo, Ontario, Canada..
 The flying sidekick traveling salesman problem: Optimization of drone-assisted parcel delivery. Transportation Research Part C: Emerging Technologies, 54:86–109, 2015. and .
 On the quasi-steady aerodynamics of normal hovering flight part ii: Model implementation and evaluation. Journal of The Royal Society Interface, 11(94):20131197, 2014. and .
 Multi-Generator (MGEN), NRL software. http://cs.itd.nrl.navy.mil/work/mgen/index,php.
 Multi-Generator (MGEN). , http://cs.itd.nrl.navy.mil/work/mgen/index.php.
 2009., , and . Mobile object tracking techniques in wireless sensor networks. In International Conference on Ultra Modern Telecommunications Workshops, ICUMT ‘09, pages 1–8, October
 2004., , , and . An architectural framework for providing reliability and security support. In IEEE International Conference on Dependable Systems and Networks, pages 585–594, July
 Proceedings of the ACM MobiHoc Workshop on Airborne Networks and Communications, pages 43–47, Hilton Head Island, SC, June 2012., , and . Performance analysis of AeroRP with ground station advertisements. In
 NASA Safe Autonomous Systems Operations (SASO) project www.aeronautics.nasa.gov/ aosp/sasop/.
 NASA Unmanned Aircraft System (UAS) Traffic Management (UTM) http://utm.arc,nasa.gov/.
 Next Generation Air Transportation System (NextGen) www.faa.gov/nextgen/.
 2015., , and . ResTP–A Transport Protocol for FI Resilience. In Proceedings of the 10th International Conference on Future Internet Technologies (CFI), June
 2011., , and . Efficient target tracking using mobile sensors. In 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pages 405–408, December
 Oceus. Above the clouds to support public safety. http://oceusnetworks.com/, 2013.
 Office of Naval Research. LOCUST: Autonomous, swarming UAVs fly into the future, April 2015. www.onr.navy.mil/Media-Center/Press-Releases/2015/LOCUST-lowcost- UAV-swarm-ONR.aspx. (Retrieved May 2016)
 US Department of Transportation. Unmanned aircraft system (UAS) service demand 2015–2035: Literature review and projections of future usage (dot-vntsc-dod-13-01). fas.org/irp/ program/collect/service.pdf, 2013.
 2009. and . Mobile Ad Hoc Network (MANET): Extension of OSPF using connected dominating set (CDS) flooding. RFC 5614 (Experimental), August
 1972. and . On the sum of two periodic functions. Two-Year College Mathematics Journal, pages 33–38,
 Orion product by Aurora. www.aurora.aero/orion/.
 2007., Fault detection and diagnosis in real-time, safety critical embedded systems: A methodology for uninhabited aerial vehicles. M.S. Thesis, Department of Aerospace Engineering, University of Illinois at Urbana-Champaign,
 IEEE Digital Avionics Systems Conference, Portland, Oregon, October 16–19, 2006. and , Optic flow: A computer vision approach to object avoidance on UAVs.
 AIAA Guidance, Navigation, and Control Conference and Exhibit, Honolulu, HI, August 2008. and , A dynamic threshold approach to fault detection in uninhabited aerial vehicles.
 Proceedings of the 28th International Congress of the Aeronautical Sciences: ICAS, Brisbane, Australia, 2012., , , and . Control concept of a tiltwing UAV during low speed manoeuvring. In
 Drive-thru internet: IEEE 802.11b for “automobile” users. In 23rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), volume 1, page 373, March 2004. and .
 SIGCOMM ‘94: Proceedings of the Conference on Communications Architectures, Protocols, and Applications, pages 89–100, New York, NY, USA, 1994. ACM., , and . Reliable and efficient hop-byhop flow control. In
 Cooperative relaying for ad hoc ground networks using swarms. In Proc. IEEE Milit. Comm. Conf. (MILCOM' 05), volume 3, pages 1588–1594, October 2005., , and .
 Rutgers L. Rev., 27:275, 1973.. Definition of privacy.
 Gigabit Networking. Addison-Wesley Longman Publishing Co., Boston, MA, USA, 1994..
 Colin Percival. Cache missing for fun and profit. In Proceedings of BSDCan 2005, 2005.
 2003., , and . Ad hoc on-demand distance vector (AODV) routing. RFC 3561 (Experimental), July
 1997. and , Ad-hoc on-demand distance vector routing. In Proceedings of the 2nd IEEEWorkshop on Mobile Computing Systems and Applications,
 ACM SIGCOMM, pages 234–244, London, 1994. and Pravin Bhagwat. Highly dynamic destination-sequenced distancevector routing (DSDV) for mobile computers. In
 Ad hoc Networking, Volume 1. Addison-Wesley, Reading, 2001. et al.
 Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 492–497, Cancun, Mexico, March 2011., , , and . A geographical routing protocol for highly-dynamic aeronautical networks. In
 1980.. User datagram protocol. RFC 768 (Standard), August
 3168.. Transmission control protocol. RFC 793 (Standard), September 1981. Updated by RFCs 1122,
 Power beaming flight demonstration. www.nasa.gov/centers/dryden/multimedia/ imagegallery/Power-Beaming/EC02-0232-13.html. (Retrieved May 2016)
 1991. and . A line transect model for aerial surveys. Biometrics, pages 1089–1102,
 Smart Card Programming and Security, volume 2140 of Lecture Notes in Computer Science, pages 200–210. Springer, Berlin, Heidelberg, September 2001. and . ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In Isabelle Attali and Thomas Jensen, editors,
 2001., , and . The addition of explicit congestion notification (ECN) to IP. RFC 3168 (Proposed Standard), September
 A binary feedback scheme for congestion avoidance in computer networks. ACM Transactions on Computer Systems, 8(2):158–181, 1990. and .
 A survey of routing techniques for mobile communications networks. Mob. Netw. Appl., 1(2):89–104, October 1996. and Martha Steenstrup.
 2003., , and , SHARP: A hybrid adaptive routing protocol for mobile ad hoc networks. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing,
 Christian Rechberger and Elisabeth Oswald. Practical template attacks. In ChaeHoon Lim and 2004., editors, Information Security Applications, volume 3325 of Lecture Notes in Computer Science, pages 440–456. Springer, Berlin, Heidelberg, August
 A border gateway protocol 4 (BGP-4). RFC 4271 (Draft Standard), January 2006., , and .
 2012. and . Deployable aerial communication networks: Challenges for futuristic applications. In Proc. ACM Symp. Perf. Eval. Wireless Ad Hoc, Sensor, and Ubiquitous Networks, pages 9–16,
 2011., , and . An integrated aerial telecommunications network that supports emergency traffic. In Proc. Intl. Symp. Wireless Personal Multimedia Commun. (WPMC), pages 1–5, October
 2007., , and . Lessons learned: Application of small UAV for urban highway traffic monitoring. American Inst. of Aeronautics and Astronautics, pages 1–19,
 Aerial MANETs: Developing a resilient and efficient platform for search and rescue applications. Journal of Commun., 8(4):216–224, 2013. and .
 Proceedings of the IEEE Military Communications Conference (MILCOM), pages 834–841, Baltimore, MD, November 2011., , , , , and . AeroRP performance in highly-dynamic airborne networks using 3D Gauss–Markov mobility model. In
 Çetinkaya, Erik, Perrins, and James P.G., Sterbenz. Highly-dynamic cross-layered aeronautical network architecture. IEEE Transactions on Aerospace and Electronic Systems, 47(4):2742–2765, October 2011., , Egemen K.
 Proceedings of the IEEE Military Communications Conference (MILCOM), pages 74–79, San Jose, CA, November 2010., , , and . Airborne telemetry networks: challenges and solutions in the ANTP Suite. In
 Proceedings of the IEEE Military Communications Conference (MILCOM), pages 1–9, San Diego, CA, November 2008., , , and . Cross-layer architectural framework for highly-mobile multihop airborne telemetry networks. In
 Proceedings of the IEEE Military Communications Conference (MILCOM), pages 737–745, Orlando, FL, November 2012., , , and . Opportunistic transport for disrupted airborne networks. In
 Proceedings of the International Telemetering Conference (ITC), Las Vegas, NV, October 2009. and . Performance and disruption tolerance of transport protocols for airborne telemetry networks. In
 2006., , , , , , , and . A modular software infrastructure for distributed control of collaborating UAVs. AIAA Conference on Guidance, Navigation, and Control,
 An overview of emerging results in cooperative UAV control. In Proc. IEEE Conf. Decision and Control, volume 1, pages 602 –607, December 2004., , , , and .
 Safety and Airspace Regulation Group, United Kingdom. CAP 393: Air Navigation 2009: The Order and the Regulations, 2015. www.caa.co.uk/docs/33/CAP%20393%20Fourth %20edition%20Amendment%201%20April%202015.pdf.
 Safety and Airspace Regulation Group, United Kingdom. CAP 722: Unmanned aircraft system operations in UK airspace guidance, 2015. www.caa.co.uk/docs/33/CAP%20722 %20Sixth%20Edition%20March%202015.pdf.
 On joint MAC and network coding in wireless ad hoc networks. IEEE Transactions on Information Theory, 53(10):3697–3713, October 2007. and .
 The global in-flight internet. IEEE Journal on Selected Areas in Communications, 24(9):1748–1757, September 2006. and .
 Aeronautical ad hoc networks. In IEEE Wireless Communications and Networking|Conference, 2006. WCNC 2006, volume 1, pages 246–251, April 2006., , and .
 Beacon-less geographic routing made practical: Challenges, design guidelines, and protocols. IEEE Communications Magazine, 47(8):85–91, August 2009., , and .
 2007., , and . BOSS: Beacon-less on demand strategy for geographic routing in wireless sensor networks. In IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pages 1–10, October
 Francesc Sardà-Palomera, Fine-scale bird monitoring from light unmanned aircraft systems. Ibis, 154(1):177–183, 2012., , , , , , and Francesc Sardà.
 Akira Sato. Civil UAV applications in Japan and related safety and certification, 2003. http://Yamahawebsite.pdf.
 SC-228. Overview, 2013. http://RTCAwebsite.pdf.
 SC-228. Command and control link whitepaper, 2014. www.rtca.org/content.asp? contentid=178.
 SC-228. Detect and avoid whitepaper, 2014. www.rtca.org/content.asp?contentid=178.
 Communications Magazine, IEEE, 52(5):104–110, May 2014., , , and . LDACS: future aeronautical communications for air-traffic management.
 LDACS: Future aeronautical communications for air-traffic management. Communications Magazine, IEEE, 52(5):104–110, 2014., , , and Nicolas Schneckenburger.
 2000., , , , and . UAV over-the-horizon disaster management demonstration projects. Technical report, University of Southampton,
 1992., , and . Use of helicopters for estimating numbers of greater and lesser prairie-chicken leks in eastern Colorado. Wildlife Society Bulletin, pages 106–113,
 5506., , , and . RTP: A transport protocol for real-time applications. RFC 3550 (Standard), July 2003. Updated by RFC
 2007. and . Bundle protocol specification. RFC 5050 (Experimental), November
 Miniaturization limitations of hcci internal combustion engines. Applied Thermal Engineering, 29(2):400–411, 2009., , and .
 Experimental and computational modeling of the kinematics and aerodynamics of flapping wing. Journal of Aircraft, 50(6):1734–1747, 2013., , and .
 Sergei Skorobogatov. Tamper resistance and hardware security. www.cl.cam.ac.uk/∼sps32/ PartII_030214.pdf, February 2014. [Accessed 3 May 2014.]
 ical fault induction attacks. In , , and , editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 2–12. Springer, Berlin, Heidelberg, 2003. and . Opt
 Therese Skrzypietz. Unmanned aircraft systems for civilian missions. Technical Report BIGS Policy Paper No. 1, Brandenburg Institute for Society and Security, February 2012.
 2011., , and . The ldacs1 physical layer design. In Dr. , editor, Future Aeronautical Communications. InTech,
 South African Civil Aviation Authority. Civil Aviation Act, 2009 (Act No. 13, of 2009), 2009. www.acts.co.za/civil-aviation-act-2009/.
 South African Civil Aviation Authority. Frequently asked questions for unmanned aircraft systems in South Africa, 2014. http://SouthAfricaCAwebsite.pdf.
 2014. and . Towards more practical time-driven cache attacks. In David Naccache and , editors, Information Security Theory and Practice. Securing the Internet of Things, volume 8501 of Lecture Notes in Computer Science, pages 24–39, July
 Swarm intelligence based key generation for stream cipher. Security and Communication Networks, 4(2):181–194, 2011. and Pai.
 1997. and . Flushing responses of wintering bald eagles to military activity. The Journal of Wildlife Management, pages 1307–1313,
 Routing in Communication Networks. Prentice Hall, 1995..
 IEEE WCNC 2000, Chicago, September 2000., Routing under uncertainty: A comparative study,
 2008. and . On visual real time mapping for unmanned aerial vehicles. In Proc. Congress of the Intl. Soc. Photogrammetry and Remote Sensing (ISPRS), pages 57–62,
 Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 54(8):1245–1265, 2010., , , , , , and .
 Telecommunication Systems, 56(1):17–31, 2014., , , , , , and . Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance (invited paper).
 High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication. Wiley, 1st edition, May 2001. and .
 . Drones in the smart city and IoT: Protocols, resilience, benefits, and risks. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use.
 Proceedings of the 1st ACM Workshop on Wireless Security (WiSe), pages 31–40, Atlanta, GA, September 2002., , Regina , , , , and . Survivable mobile wireless networks: Issues, challenges, and research directions. In
 Proceedings of the Tenth International Conference on Computer Communication (ICCC), pages 379–387, New Delhi, India, November 1990. Narosa Publishing House. and . AXON: Application-oriented lightweight transport protocol design. In
 1997. Obsoleted by RFC 2581.. TCP Slow Start, congestion avoidance, fast retransmit, and fast recovery algorithms. RFC 2001 (Proposed Standard), January
 2015., , and . On the security of the automatic dependent surveillance-broadcast protocol. Communications Surveys Tutorials, IEEE, 17(2):1066–1087, Second quarter
 Realities and challenges of nextgen air traffic management: The case of ads-b. Communications Magazine, IEEE, 52(5):111–118, 2014., , , and Ivan Martinovic.
 Search using multiple UAVs with flight time constraints. IEEE Trans. Aerospace and Electronic Systems, 40(2):491–509, April 2004. and .
 Sun and Lisa Grow. Smart growth in dumb places: Sustainability, disaster, and the future of the American city. In BYU Law Review (symposium), Forthcoming, 2011.
 Role of information and communication in redefining unmanned aerial vehicle autonomous control levels. In Proceedings of the Institution of Mechanical, Engineers, Part G: Journal of Aerospace Engineering, 224(2):171–197, 2010. and .
 Fabrice Tchakountio and Ram Ramanathan. Tracking Highly Mobile Endpoints. In Proceedings of the 4th ACM International Workshop on Wireless Mobile Multimedia, WOWMOM ‘01, pages 83–94, New York, NY, USA, 2001. ACM.
 Fabrice Tchakountio and Ram Ramanathan. Anticipatory routing for highly mobile endpoints. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 94–101, Washington, DC, 2004.
 Second International IEEE Workshop on Mobile Computing and Networking Technologies (WMCNT), pages 728–733, Moscow, October 2010., , and . Store and haul with repeated controlled flooding. In
 Proc. of the 18th ACM Conference on Computer and Communications Security, CCS ‘11, pages 75–86, New York, NY, USA, 2011. ACM., , , and . On the requirements for successful GPS spoofing attacks. In
 2008., , and . Towards a mission planning toolbox for the airborne network: Optimizing ground coverage under connectivity constraints. In Aerospace Conference, 2008 IEEE, pages 1–9. IEEE,
 Toward a fully autonomous UAV: Research platform for indoor and outdoor urban search and rescue. IEEE Robotics Automation Magazine, 19(3):46–56, Sept 2012., , , , , , , , , and .
 Transport Canada. Advisory circular: Guidance material for operating unmanned air vehicle systems under an exemption, November 2014. www.tc.gc.ca/eng/civilaviation/ opssvs/ac-600-004-2136.html.
 Transport Canada. Canadian civil aviation regulations (SOR/96-433), August 2015. http://laws-lois.justice.gc.ca/eng/regulations/SOR-96-433/.
 2012. http://www.plantengineering.com/single-article/selecting-proximity-sensors-for-diverseapplications/ 2f48d26acd6c636a474390c3edaaeb11.html. (Retrieved May 2016). Selecting proximity sensors for diverse applications, September
 IEEE Digital Avionics Systems Conference, Portland, Oregon, October 16–19, 2006., , and , A safety-oriented approach to designing UAVs using COTS technology.
 2009., , and . Fault tolerant triangulation in distributed aircraft networks with automatic dependent surveillance broadcast. International Journal of Systems, Control and Communications, , , , and (eds.), June
 United States Government. Title 14 code of federal regulations. http://14CFR.pdf.
 United States Government. Title 14 code of federal regulations, part 21 certification procedures for products and parts. www.ecfr.gov/cgi-bin/text-idx?rgn=div5;node=14 %3A184.108.40.206.9.
 United States Government. Title 14 code of federal regulations, part 23 airworthiness standards: Normal, utility, acrobatic, and commuter category airplanes. www.ecfr.gov/ cgi-bin/text-idx?SID=9f1208983b800adf381aec3ec240f673truept14.1.23rgn=div5.
 United States Government. Title 14 code of federal regulations, part 39 airworthiness directives. www.ecfr.gov/cgi-bin/text-idx?c=ecfr;rgn=div5;view=text;node=14%3A220.127.116.11.20; idno=14;sid=df85233338549812773109cf75d37dfc;cc=ecfr.
 United States Government. Title 14 code of federal regulations, subchapter b: Airmen. www.ecfr.gov/cgi-bin/text-idx?gp=SID=mc=truetpl=/ecfrbrowse/Title14/ 14CIsubchapD.tpl.
 United States Government. Title 14 code of federal regulations, subchapter g: Air carriers and operators for compensation or hire: Certification and operations. www.ecfr.gov/cgibin/ text-idx?tpl=/ecfrbrowse/Title14/14cfr121_main_02.tpl.
 Bill Vaglienti. Communications for the piccolo avionics. Cloud Cap Technology Technical Document, September 2006. ﹛ALSO ANDRES 3﹜
 Bill Vaglienti. Piccolo. Control laws for 2.0.x. Cloud Cap Technology Technical Document, March 2007.
 Bill Vaglienti and Ross Hoag. A highly integrated UAV avionics system. Cloud Cap Technology Technical Document, April 2003. ﹛ALSO ANDRES 2﹜
 Epidemic routing for partially-connected ad hoc networks. Technical Report CS-200006, Duke University, April 2000. and .
 Handbook of Unmanned Aerial Vehicles. Springer Publishing Company, Inc., 2014. and .
 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 13–25. Springer International Publishing, 2013., , , , , , , , , and . Airborne base stations for emergency and temporary events. In , , , , and , editors, Personal Satellite Services, volume 123 of
 Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, DroNet ‘15, pages 15–19, New York, NY, USA, 2015. ACM., , and . Analysis of harmful interference to and from aerial IEEE 802.11 systems. In
 Delay Tolerant Networks: Protocols and Applications. CRC Press, 2012., , and .
 Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, volume 4462 of Lecture Notes in Computer Science, pages 138–149. Springer, Berlin, Heidelberg, May 2007., , and . Reverse engineering Java card applets using power analysis. In , , , and , editors,
 Smart Card Research and Advanced Application, volume 6035 of Lecture Notes in Computer Science, pages 133–147. Springer, Berlin, Heidelberg, April 2010. and . Combined attacks and countermeasures. In
 2004. and . A framework and analysis for cooperative search using UAV swarms. In Proc. ACM Symp. Appl. Comp.,
 2009., , and . Coordinated search with a swarm of UAVs. In Proc. IEEE Wkshp. Sensor, Mesh and Ad Hoc Commun. and Networks (SECON Workshops ‘09), pages 1–3, June
 Topics in Cryptology — CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 192–207. Springer, Berlin, Heidelberg, April 2001. and . Distinguishing exponent digits by observing modular subtractions. In , editor,
 2003., , and . CODA: Congestion detection and avoidance in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys), pages 266–279, November
 A smooth-turn mobility model for airborne networks. IEEE Transactions on Vehicular Technology, 62(7):3359–3370, 2013., , , and .
 Protocol testing of SCPS-TP over NASA's ACTS asymmetric links. IEEE Transactions on Aerospace and Electronic Systems, 45(2):790–798, April 2009. and .
 1999., , , and . Response of fall-staging brant and Canada geese to aircraft overflights in southwestern Alaska. The Journal of Wildlife Management, pages 373–381,
 Unmanned aircraft systems in remote sensing and scientific research: Classification and considerations of use. Remote Sensing, 4(6):1671–1692, 2012., , and .
 Small unmanned aircraft systems for low-altitude aerial surveys. The Journal of Wildlife Management, 74(7):1614–1619, 2010., , , , , , , and .
 Roland Everett Weibel. Safety considerations for operation of different classes of unmanned aerial vehicles in the national airspace system. PhD thesis, Massachusetts Institute of Technology, 2005.
 2004. and Jr. . Safety considerations for operation of different classes of UAVs. In The NAS. AIAA 3rd “Unmanned Unlimited” , Workshop, and Exhibit, 1:341–351, September
 2013., , , , , , , , , , , , , and . Enabling communications in disadvantage environments: An airborne remote communication (ARC) platform. In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pages 797–803, November
 Privacy and Freedom. The Bodley Head Ltd, London, England, 4 1970..
 WG-93 Light Remotely Piloted Aircraft Systems Operations.WG93 on lightweight RPAS, April 2012. www.eurocae.net/wgs/active/?wg=WG-93.
 2006., , , , , and . Cooperative tracking of moving targets by a team of autonomous UAVs. In IEEE/AIAA 25th Digital Avionics Systems Conference, pages 1–9, October
 Wilde Solmecke. Die rechtlichen Probleme des Einsatzes von zivilen Drohnen, January 2014. www.wbs-law.de/internetrecht/die-rechtlichen-probleme-des-einsatzesvon- zivilen-drohnen-49854/.
 On the size and flight diversity of giant pterosaurs, the use of birds as pterosaur analogues and comments on pterosaur flightlessness. PloS One, 5(11):e13982, 2010. and .
 2002. and . Denial of service in sensor networks. Computer, 35:54–62, October
 2007.. Liftoff of a 60mg flapping-wing mav. In IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007. pages 1889–1894. IEEE,
 2012., , and Falko Kuester. Airgsm: , flying gsm cellular base station for flexible field communications. In Aerospace Conference, 2012 IEEE, pages 1–9. IEEE,
 Xamen Technologies www.xamen.fr/.
 Timecritical cooperative control of multiple autonomous vehicles: Robust distributed strategies for path-following control and time-coordination over dynamic communications networks. IEEE Control Systems, 32(5):49–73, October 2012., , , , , and .
 Jim Anderson Xilinx. Case study: Secure FPGA technology enables UAV communications and control. http://mil-embedded.com/articles/case-enables-uav-communicationscontrol/, April 2011. [Accessed 3 May 2014.]
 Target tracking and mobile sensor navigation in wireless sensor networks. IEEE Transactions on Mobile Computing, 12(1):177–186, January 2013., , and .
 2010. and . Stationary and mobile target detection using mobile wireless sensor networks. In Proc. IEEE Conf. Computer Commun. Wksps (INFOCOM), pages 1–5,
 2014., , , and . Experimental performance analysis of two-hop aerial 802.11 networks. In Proc. IEEE Wireless Commun. and Net. Conf., April
 2013., , and . Achieving air–ground communications in 802.11 networks with three-dimensional aerial mobility. In Proc. IEEE Int. Conf. Computer Commun. (INFOCOM), Mini Conference, April
 Computer and Information Sciences –ISCIS 2006, volume 4263 of Lecture Notes in Computer Science, pages 434–444. Springer, Berlin, Heidelberg, 2006., , and . HIMUTSIS: Hierarchical multitier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes. In , , , , and , editors,
 A review on marine search and rescue operations using unmanned aerial vehicles. World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 9(2):390–393, 2015., , and .
 2009., , and . Design of the samarai monowing rotorcraft nano air vehicle. In Proceedings of the American Helicopter Society AHS 65th Annual Forum and Technology Display,
 An implementation framework for trajectory-based routing in ad hoc networks. Ad Hoc Networks, 4(1):125–137, 2006., , and .
 2005., , and . A centralized control algorithm for target tracking with UAVs. In Conference Record of the Thirty-Ninth Asilomar Conference on Signals, Systems and Computers, pages 1148–1152, October
 Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges. Communications Surveys & Tutorials, IEEE, 8(1):24–37, 2006..
 Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ‘04, pages 187–198, New York, NY, USA, 2004. ACM., , and . A message ferrying approach for data delivery in sparse mobile ad hoc networks. In
 Energy efficient mobile target tracking using flying drones. Procedia Computer Science, 19(0):80–87, 2013., , , and Francesca Guerriero.
 Distributed mobility management for target tracking in mobile sensor networks. IEEE Transactions on Mobile Computing, 6(8):872–887, August 2007. and .
 2011., , and . On connectivity of airborne networks in presence of region-based faults, in Proceedings of the Military Communications Conference (MILCOM), pp. 197–2002, IEEE
 2014., , and . Optical tracking of multiple targets using UAVs, in International Conference on Combinatorial Optimization and Applications, pp. 750–763, Springer
 Ecological Census Techniques –A Handbook. Cambridge University Press, 2005..
 Ecological risk assessment framework for low-altitude aircraft overflights: I.Planning the analysis and estimating exposure. Risk Analysis, 21(2):251–262, 2001., , , , and .
 Efficacy of two variations on an aerial lekcount method for greater sage-grouse. Western North American Naturalist, 69:413–416, 2009., , , and .