Skip to main content
UAV Networks and Communications

Book description

The first book to focus on the communications and networking aspects of UAVs, this unique resource provides the fundamental knowledge needed to pursue research in the field. The team of authors covers the foundational concepts of the topic, as well as offering a detailed insight into the state of the art in UAVs and UAV networks, discussing the regulations, policies, and procedures for deployment (including analysis of risks and rewards), along with demonstrations, test-beds, and practical real-world applications in areas such as wildlife detection and emergency communications. This is essential reading for graduate students, researchers, and professionals in communications and networking.

Refine List
Actions for selected content:
Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Send to Kindle
  • Send to Dropbox
  • Send to Google Drive
  • Send content to

    To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to .

    To send content items to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

    Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

    Find out more about the Kindle Personal Document Service.

    Please be advised that item(s) you selected are not available.
    You are about to send

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
[1] Albatross. [Accessed 28 August 2015].
[2] DTN research group.
[3] Made in Oregon: The Most Secure UAV Software in the World -> 60 Minutes. 60-minutes-video/. [Accessed 28 August 2015].
[4] Secure Solutions. [Accessed 28 August 2015].
[5] SkyJack Project. [Accessed 28 August 2015].
[6] SkyScanner. [Accessed 30 December 2015].
[7] Solar-Storm. [Accessed 28 August 2015].
[8] Global information grid (GIG) overarching policy. Department of Defense, Directive, November 2003.
[9] iNET Needs Discernment, Report, version 1.0. Central Test and Evaluation Investment Program (CTEIP), May 2004.
[10] The ns-3 Network Simulator., July 2009.
[11] 112th Congress, 2nd Session, U.S., House of Representatives. FAA Modernization and Reform Act of 2012, February 2012. CRPT-112hrpt381.pdf.
[12] M., Abolhasan, T., Wysocki, and E., Dutkiewicz. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1):1–22, January 2004.
[13] M.C., Achtelik, J., Stumpf, D., Gurdan, and K.-M., Doth. Design of a flexible high performance quadcopter platform breaking the mav endurance record with laser power beaming. In Proc. IEEE/RSJ Intl. Conf. Intelligent Robots and Systems (IROS), pages 5166–5172, September 2011.
[14] E., Adamey and U., Ozguner. A decentralized approach for multi-UAV multitarget tracking and surveillance. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 8389, May 2012.
[15] A., Adams, J., Nicholas, and W., Siadak. Protocol independent, multicast, dense mode protocol specification (PIM-DM). Internet RFC 3973, February 2005.
[16] Carlisle Adams and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Longman Publishing Co., Boston, MA, USA, 2nd edition, 2002.
[17] B., Adamson, C., Bormann, M., Handley, and J., Macker. NACK-oriented reliable multicast (NORM) transport protocol. RFC 5740, November 2009.
[18] Agencia Nacional de Aviacao Civil. Regulamentos Brasileiros de Aviacao Civil (RBAC), 2012.
[19] Dakshi, Agrawal, Bruce, Archambeault, Josyula R., Rao, and Pankaj, Rohatgi. The EM Side—Channel(s). In Burton S., Kaliski, Çetin K., Koç, and Christof, Paar, editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 29–45. Springer, Berlin, Heidelberg, August 2003.
[20] Dakshi, Agrawal, Josyula R., Rao, and Pankaj, Rohatgi. Multi-channel attacks. In >Colin D., Walter>, >Çetin K., Koç>, and >Christof, Paar>, editors, Cryptographic Hardware and Embedded Systems –CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 2–16. Springer, Berlin, Heidelberg, September 2003.
[21] R., Ahlswede, Ning, Cai, S.-Y.R., Li, and R.W., Yeung. Network information flow. IEEE Transactions on Information Theory, 46(4):1204–1216, July 2000.
[22] Jeff, Ahrenholz, Claudiu, Danilov, Thomas R., Henderson, and Jae H., Kim, CORE: A realtime network emulator. IEEE MILCOM 2008, San Diego, CA, November 2008.
[23] Raja Naeem, Akram, Pierre-François, Bonnefoi, Serge, Chaumette, Konstantinos, Markantonakis, and Damien, Sauveron. Improving security of autonomous UAVs fleets by using new specific embedded secure elements –a position paper. In 2nd AETOS International Conference on “Research Challenges for Future RPAS/UAV Systems,” Bordeaux, France, September 2014.
[24] Ian F., Akyildiz, Xudong, Wang, and Weilin, Wang. Wireless mesh networks: a survey. Computer Networks, 47(4):445–487, 2005.
[25]Sattam S., Al-Riyami and Kenneth G., Paterson. Advances in Cryptology –ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30–December 4, 2003, Certificateless Public Key, Cryptography, pages 452–473. Springer, Berlin, Heidelberg, 2003.
[26] Roberto, Albertani, Bret, Stanford, James, Hubner, and Peter, Ifju. Characterization of flexible wing mavs: Aeroelastic and propulsion effects on flying qualities. In Proceedings of AIAA Atmospheric Flight Mechanics Conference and Exhibit, pages 15–18, August 2005.
[27] Mohammed J. F., Alenazi, Santosh Ajith, Gogi, Dongsheng, Zhang, Egemen K., Çetinkaya, Justin P., Rohrer, and James P.G Sterbenz. Implementation of aeronautical network protocols. In Proceedings of the AIAA Infotech@Aerospace Conference, Boston, MA, August 2013.
[28] M., Allman, S., Dawkins, D., Glover, J., Griner, D., Tran, T., Henderson, J., Heidemann, J., Touch, H., Kruse, S., Ostermann, K., Scott, and J., Semke. Ongoing TCP research related to satellites. RFC 2760 (Informational), February 2000.
[29] M., Allman, D., Glover, and L., Sanchez. Enhancing TCP over satellite channels using standard mechanisms. RFC 2488 (Best Current Practice), January 1999.
[30] M., Allman, V., Paxson, and W., Stevens. TCP Congestion Control. RFC 2581 (Proposed Standard), April 1999. Obsoleted by RFC 5681, updated by RFC 3390.
[31] J., Allred, A., Hasan, S., Panichsakul, W., Pisano, P., Gray, J., Huang, R., Han, D., Lawrence, and K., Mohseni. SensorFlock: An airborne wireless sensor network of micro-air vehicles. In Proceedings ACM International Conference Embedded Networked Sensor Systems, pages 117–129, 2007.
[32] A.I., Alshbatat and D., Liang. Adaptive MAC protocol for UAV communication networks using directional antennas. In Proc. Intl. Conf. Networking, Sensing and Control (ICNSC), pages 598–603, April 2010.
[33] Hassan, Aly and Mohammed, ElGayyar. Attacking AES using Bernsteins attack on modern processors. In >Amr, Youssef>, >Abderrahmane, Nitaj>, and >AboulElla, Hassanien>, editors, Progress in Cryptology –AFRICACRYPT 2013, volume 7918 of Lecture Notes in Computer Science, pages 127–139. Springer, Berlin, Heidelberg, June 2013.
[34] David E., Andersen, Orrin J., Rongstad, and William R., Mytton. Response of nesting red-tailed hawks to helicopter overflights. Condor, pages 296–299, 1989.
[35] T., Andre, K., Hummel, A., Schoellig, E., Yanmaz, M., Asadpour, C., Bettstetter, P., Grippa, H., Hellwagner, S., Sand, and S., Zhang. Application-driven design of aerial communication networks. IEEE Communications Magazine, 52(5):129–137, May 2014.
[36] J.G., Andrews, S., Buzzi, W., Choi, S.V., Hanly, A., Lozano, A.C.K. Soong, and J.C., Zhang. What will 5G be? IEEE Journal on Selected Areas in Communications, 32(6):1065–1082, June 2014.
[37] ARINC. 618-6: Air. Ground Character-Oriented Protocol Specification.
[38] M., Asadpour, D., Giustiniano, and K., Hummel. From ground to aerial communication: dissecting WLAN 802.11n for the drones. In Proc. ACM MobiCom –WinTech Wksp, pages 25–32, 2013.
[39] M., Asadpour, D., Giustiniano, K., Hummel, and S., Heimlicher. Characterizing 802.11n aerial communication. In Proc. ACM MobiHoc Wksp on Airborne Networks and Commun., pages 7–12, July 2013.
[40] M., Asadpour, D., Giustiniano, K., Hummel, S., Heimlicher, and S., Egli. Now or later? Delaying data transfer in time-critical aerial communication. In Proc. ACM CoNEXT, pages 127–132, December 2013.
[41] M., Asadpour, B., Van den Bergh, D., Giustiniano, K., Hummel, S., Pollin, and B., Plattner. Micro aerial vehicle networks: an experimental analysis of challenges and opportunities. Communications Magazine, IEEE, 52(7):141–149, July 2014.
[42] G.R., Asha, V., Vaidhehi, Toa Bi, Irie Guy, Cedric, and S., Balaji. A Review of Routing Protocols for Airborne Networks. IJIRAE, 3(2), March 2015.
[43] Atlantik Solar.
[44] Hari, Balakrishnan, Randy H., Katz, and Venkata N., Padmanbhan. The effects of asymmetry on TCP performance. Mob. Netw. Appl., 4(3):219–241, 1999.
[45] Hagai Bar-El, Hamid, Choukri, David, Naccache, Michael, Tunstall, and Claire Whelan. The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370–382, February 2006.
[46] Guillaume, Barbu and Christophe, Giraud. New countermeasures against fault and software type confusion attacks on java cards. In >David, Naccache> and Damien, Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things, volume 8501 of Lecture Notes in Computer Science, pages 57–75, July 2014.
[47] Stefano, Basagni, Imrich, Chlamtac, Violet R., Syrotiuk, and Barry A., Woodward. A distance routing effect algorithm for mobility (DREAM). In 4th Annual ACM Mobile Computing and Networking, MobiCom 1998, pages 76–84, New York, NY, USA, 1998. ACM.
[48] R.-W., Beard. Multiple UAV cooperative search under collision avoidance and limited range communication constraints. In Proc. IEEE CDC, pages 25–30, 2003.
[49] Ilker Bekmezci, Ozgur Koray, Sahingoz, and ¸Samil Temel. Flying ad-hoc networks (FANET): A survey. Ad Hoc Networks, 11(3):1254–1270, May 2013.
[50] Wells C., Bennet. Civilian, drones, privacy, and the federal–state balance. Technical, report, Brookings, Institute, 09 2014.∼/media/Research/Files/Reports/2014/09/civilian-drones-privacy/civilian_drones_privacy_bennett_NEW.pdf?la=en.
[51] J., Berger and J., Happe. Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team. In IEEE Congress on Evolutionary Computation (CEC), pages 1–8, July 2010.
[52] Daniel J., Bernstein. Cache-timing attacks on AES. Technical, report, University of Illinois at Chicago, 2005.
[53] K., Bhamidipati, D., Uhlig, and N., Neogi. Engineering safety and reliability into UAV Systems: Mitigating the ground impact hazard. AIAA Guidance, Navigation and Control Conference and Exhibit, Hilton Head, SC, August 2007.
[54] K., Bhamidipati, Mitigating the UAV ground impact hazard using fault-tree analysis and a fuel consumption model. M.S. Thesis, Department of Aerospace Engineering, University of Illinois at Urbana-Champaign, 2007.
[55] Eli|Biham and Adi, Shamir. Differential fault analysis of secret key cryptosystems. In Burton S., Kaliski, editor, Advances in Cryptology CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 513–525. Springer, Berlin, Heidelberg, August 1997.
[56] P., Bilaye, V.N., Gawande, U.B., Desai, A.A., Raina, and R.S., Pant. Low cost wireless internet access for rural areas using tethered aerostats. In 2008 IEEE Region 10 and the Third International Conference on Industrial and Information Systems, pages 1–5, December 2008.
[57] Sanjit Biswas and Robert Morris. Opportunistic routing in multi-hop wireless networks. SIGCOMM Computer Communication Review, 34(1):69–74, 2004.
[58] B., Blum, T., He, S., Son, and J., Stankovic. IGF: A state-free robust communication protocol for wireless sensor networks. Technical Report CS-2003-11, Department of Computer Science, University of Virginia, USA, 2003.
[59] Y., Bo, Q., Yongyuan, and C., Yan, A method for fault detection and isolation in the integrated navigation system for UAV. Measurement Science and Technology, 17:1522–1528, 2006.
[60] F., Boehm and A., Schulte. Air to ground sensor data distribution using IEEE 802.11n Wi-Fi network. In Proc. IEEE/AIAA Digital Avionics Sys. Conf. (DASC), pages 4B2–1–4B2–10, October 2013.
[61] Dan, Boneh, Richard A., DeMillo, and Richard J., Lipton. On the importance of checking cryptographic protocols for faults. In Walter, Fumy, editor, Advances in Cryptology EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 37–51. Springer, Berlin, Heidelberg, May 1997.
[62] Pierre François, Bonnefoi, Damien, Sauveron, and Jong Hyuk, Park. MANETS: an exclusive choice between use and security? Computing and Informatics. Special Issue on Interactive Multimedia and Intelligent Services in Mobile and Ubiquitous Computing (MUC), 27(5):799–821, 2008.
[63] J., Border, M., Kojo, J., Griner, G., Montenegro, and Z., Shelby. Performance enhancing proxies intended to mitigate link-related degradations. RFC 3135 (Informational), June 2001.
[64] Botterell. The common alerting protocol: an open standard for, alerting, warning and notification. In Proceedings of the 3rd International ISCRAM Conference, pages 497–503, 2006.
[65] Ouns, Bouachir, Alinoe, Abrassart, Francisco, Garcia, and Nicolas, Larrieu. A mobility model for UAV ad hoc network. In International Conference on Unmanned Aircraft Systems (ICUAS), 2014, pages 383–388. IEEE, 2014.
[66] R., Braden. Requirements for internet hosts –communication layers. RFC 1122 (Standard), October 1989. Updated by RFCs 1349, 4379.
[67] R., Braden. T/TCP –TCP extensions for transactions functional specification. RFC 1644 (Experimental), July 1994.
[68] Eric, Brier, Christophe, Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems –CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 16–29. Springer, Berlin, Heidelberg, August 2004.
[69] A.L., Brown. Measuring the effect of aircraft noise on sea birds. Environment International, 16(4):587–592, 1990.
[70] T., Brown, B., Argrow, C., Dixon, S., Doshi, R., Thekkekunnel, and D., Henkel. Ad hoc UAV ground network (Augnet). In Proc. AIAA Unmanned Unlimited Tech. Conf., September 2004.
[71] Timothy X., Brown, Brian, Argrow, Cory, Dixon, Sheetalkumar, Doshi, Roshan-George Thekkekunnel, and Daniel Henkel. Ad hoc UAV ground network (augnet). In AIAA 3rd Unmanned Unlimited Technical Conference, pages 1–11, 2004.
[72] Dan, Broyles, Abdul, Jabbar, and James P.G., Sterbenz. Design and analysis of a 3–D Gauss- Markov mobility model for highly dynamic airborne networks. In Proceedings of the International Telemetering Conference (ITC), San Diego, CA, October 2010.
[73] I., Bucaille, S., Hethuin, T., Rasheed, A., Munari, R., Hermenier, and S., Allsopp. Rapidly deployable network for tactical applications: Aerial base station with opportunistic links for unattended and temporary events absolute example. In Proc. IEEE Military Commun. Conf. (MILCOM 2013), pages 1116–1120, November 2013.
[74] Jack L., Burbank, Philip F., Chimento, Brian K., Haberman, and William T., Kasch. Key challenges of military tactical networking and the elusive promise of manet technology. Communications Magazine, IEEE, 44(11):39–45, 2006.
[75] O., Burdakov, P., Doherty, K., Holmberg, J., Kvarnstrom, and P.-M., Olsson. Positioning unmanned aerial vehicles as communication relays for surveillance tasks. In J., Trinkle, Y., Matsuoka, and J.A., Castellanos, editors, Robotics: Science and Systems V, pages 257–264. MIT Press, 2010.
[76] John, Burgess, Brian, Gallagher, David, Jensen, and Brian Neil, Levine. Maxprop: Routing for vehicle-based disruption-tolerant networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), April 2006.
[77] A., Burkle, F., Segor, and M., Kollmann. Towards autonomous micro UAV swarms. Journal of Intelligent and Robotic Systems, 61(1-4):339–353, 2011.
[78] S., Burleigh, A., Hooke, L., Torgerson, K., Fall, V., Cerf, B., Durst, K., Scott, and H., Weiss. Delay-tolerant networking: An approach to interplanetary internet. IEEE Communications Magazine, 41(6):128–136, June 2003.
[79] S., Burleigh, M., Ramadas, and S., Farrell. Licklider transmission protocol –motivation. RFC 5325 (Informational), September 2008.
[80] A., Capone, L., Pizziniaco, I., Filippini, and M.A.G. de la Fuente. A SiFT: An efficient method for trajectory based forwarding. In 2nd International Symposium on Wireless Communication Systems, 2005, pages 135–139, 2005.
[81] Eric Baldwin Carr. Unmanned aerial vehicles: Examining the, safety, security, privacy and regulatory issues of integration into US airspace. National Center for Policy Analysis (NCPA). Retrieved September 2013.
[82] Graeme Caughley. Sampling in aerial survey. The Journal of Wildlife Management, pages 605–615, 1977.
[83] Ann Cavoukian. Privacy and drones: Unmanned aerial vehicles. Technical report, Information and Privacy Commissioner, Ontario, Canada, August 2012.
[84] V., Cerf, S., Burleigh, A., Hooke, L., Torgerson, R., Durst, K., Scott, K., Fall, and H., Weiss. Delay-tolerant networking architecture. RFC 4838 (Informational), April 2007.
[85] Egemen K., Çetinkaya and James P.G., Sterbenz. Aeronautical gateways: supporting TCP/IP-based devices and applications over modern telemetry networks. In Proceedings of the International Telemetering Conference (ITC), Las Vegas, NV, October 2009.
[86] Dominique Chabot and David M., Bird. Evaluation of an off-the-shelf unmanned aircraft system for surveying flocks of geese. Waterbirds, 35(1):170–174, 2012.
[87] H.Y., Chao, Y.C., Cao, and Y.Q., Chen. Autopilots for small unmanned aerial vehicles: A survey. Intl. Journal of, Control, Automation and Systems, 8(1):36–44, 2010.
[88] Suresh, Chari, Josyula R., Rao, and Pankaj, Rohatgi. Template attacks. In Burton S., Kaliski, Çetin K., Koç, and Christof, Paar, editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 13–28. Springer, Berlin, Heidelberg, August 2003.
[89] S., Chaumette, R., Laplace, C., Mazel, R., Mirault, A., Dunand, Y., Lecoutre, and J. N., Perbet. CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experience. In 2011 –MILCOM 2011 Military Communications Conference, pages 2003–2010, November 2011.
[90] Serge, Chaumette and Damien, Sauveron. Some security problems raised by open multiapplication smart cards. In Proceedings of the 10th Nordic Workshop on Secure IT-systems (NordSec 2005), pages 1–12, Tartu, Estonia, October 2005.
[91] Serge, Chaumette and Damien, Sauveron. Wireless sensor nodes. In Konstantinos Markantonakis and Keith, Mayes, editors, Secure Smart Embedded Devices, Platforms and Applications, pages 335–350. Springer, New York, 2014.
[92] B. N., Cheng and S., Moore. A comparison ofMANET routing protocols on airborne tactical networks. In MILCOM 2012 –2012 IEEE Military Communications Conference, pages 1–6, October 2012.
[93] Long, Cheng, Chengdong, Wu, Yunzhou, Zhang, Hao, Wu, Mengxin, Li, and Carsten, Maple. A survey of localization in wireless sensor network. International Journal of Distributed Sensor Networks, 2012.
[94] Yufei, Cheng, M., Todd Gardner, Junyan, Li, Rebecca, May, Deep, Medhi, and James P.G., Sterbenz. Optimised heuristics for a geodiverse routing protocol. In Proceedings of the IEEE 10th International Workshop on the Design of Reliable Communication Networks (DRCN), pages 1–9, Ghent, Belgium, April 2014.
[95] Mung, Chiang, S.H., Low, A.R., Calderbank, and J.C., Doyle. Layering as optimization decomposition: A mathematical theory of network architectures. Proceedings of the IEEE, 95(1):255–312, January 2007.
[96] J.J., Childress and J.J., Viniotis. Autonomous aircraft with disconnectable tether, June 2, 2015. US Patent 9,045,218.
[97] Grzegorz, Chmaj and Henry, Selvaraj. Distributed processing applications for UAV/drones: A survey. In H., Selvaraj, D., Zydek, and G., Chmaj, editors, Progress in Systems Engineering, volume 1089 of Advances in Intelligent Systems and Computing, pages 449–454. Springer International Publishing, 2015.
[98] K., Choi and I., Lee. A UAV-based close-range rapid aerial monitoring system for emergency responses. In Proc. Intl. Conf. Unmanned Aerial Vehicle in Geomatics UAV-g, pages 247–252, 2011.
[99] Cisco 3845 Integrated Services Router. Specifications and technical documentation.
[100] Civil Aviation Authority, United Kingdom. Advisory circular: Unmanned aircraft and aircraft systems, 2013.
[101] Civil Aviation Flight Safety Authority, Australia. Advisory circular: Unmanned aerial vehicle operations, design specification, maintenance and training of human resources, 2002. 101c01.pdf?v=1378480833.
[102] Civil Aviation Flight Safety Authority, Australia. Civil aviation safety regulation part 101, 2002.
[103] Civil Aviation Flight Safety Authority, Australia. Notice of proposed rulemaking: Remotely piloted aircraft systems, May 2014. aussiewebsite.pdf.
[104] Civil Aviation Safety Authority, Australia. Casr part 23 - airworthiness standards for aeroplanes in the normal, utility, acrobatic or commuter category, 2013.
[105] Judy, Clapp, Anita, King, and Audrey, Taub. COTS Commercial off-the-shelf benefits and burdens. The MITRE Corporation Report, March 2001.
[106] David D., Clark. Protocol Design and Performance, April 1995.
[107] David D., Clark, Mark L., Lambert, and Lixia Zhang. NETBLT: A high throughput transport protocol. ACM SIGCOMM Computer Communication Review, 17(5):353–359, October/November 1987.
[108] T., Clausen and P., Jacquet. Optimized link state routing protocol (OLSR). RFC 3626 (Experimental), October 2003.
[109] T., De Cola and M., Marchese. Performance analysis of data transfer protocols over space communications. IEEE Transactions on Aerospace and Electronic Systems, 41(4):1200–1223, October 2005.
[110] D.T., Cole, A.H., Goktogan, P., Thompson, and S., Sukkarieh. Mapping and tracking. IEEE Robotics Automation Magazine, 16(2):22–34, June 2009.
[111] R., Coltun, D., Ferguson, and J., Moy, OSPF for IPv6. Internet RFC 2740, December 1999.
[112] John W., Connelly, W., John Arthur, and O., Doyle Markham. Sage grouse leks on recently disturbed sites. Journal of Range Management Archives, 34(2):153–154, 1981.
[113] John T., Conomy, James A., Dubovsky, Jaime A., Collazo, and W., James Fleming. Do black ducks and wood ducks habituate to aircraft disturbance? The Journal of Wildlife Management, pages 1135–1142, 1998.
[114] Marco Conti and Silvia Giordano. Multihop ad hoc networking: The reality. Communications Magazine, IEEE, 45(4):88–95, 2007.
[115] Thomas H., Cormen, Charles E., Leiserson, Ronald L., Rivest and Clifford, Stein, Introduction to Algorithms. MIT Press, 5(3):55, 2001.
[116] Jean-Sébastien, Coron, Paul, Kocher, and David, Naccache. Statistics and secret leakage. In Yair, Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 157–173. Springer, Berlin, Heidelberg, February 2001.
[117] Council of the European Union. Protection of individuals with regard to processing of personal data and on the free movement of such data, 1995. EN/TXT/PDF/?uri=CELEX:31995L0046 from=en.
[118] Council of the European Union. Regulation (EU) no 216/2008, 2008. LexUriServ/ %3APDF.
[119] Council of the European Union. Commission regulation (EU) no 1178/2011: Aircrew regulation –annexes i to iv –flight crew licensing (FCL) and medical (med) requirements, 2011.
[120] Council of the European Union. Airworthiness and Environmental Certification, 2012. Commission regulation (EU) no. 748/2012 ISBN Number: 978-92-9210-148-0.
[121] Council of the European Union. Air Operations, 2012. Commission regulation (EU) no. 965/2012. & from=EN.
[122] Council of the European Union. Part 21 Acceptable Means of Compliance and Guidance Material, 2014. Commission regulation (EU) no. 748/2012. Change%20Information%20to%20AMC-GM%20Part%2021%20-%20Issue%202.pdf.
[123] The DAISIE project.
[124] Claudiu, Danilov, Thomas R., Henderson, Thomas, Goff, Jae H., Kim, Joseph, Macker, Jeff, Weston, Natasha, Neogi, Andres, Ortiz, and Daniel, Uhlig. Experiment and field demonstration of a 802.11-based ground-UAV mobile ad-hoc network. In MILCOM 2009–2009 IEEE Military Communications Conference, pages 1–7. IEEE, 2009.
[125] Claudiu B., Danilov, Thomas R., Henderson, Phillip A., Spagnolo, Thomas, Goff, and Jae H., Kim, MANET Multicast with Multiple Gateways. IEEE MILCOM Conference, November 2008.
[126] Claudiu, Danilov, Thomas R., Henderson, Thomas, Goff, Orlie, Brewer, Jae H., Kim, Joseph, Macker and Brian, Adamson, Adaptive Routing for Tactical Communications, IEEE MILCOM 2012, Orlando, FL, November 2012.
[127] P., Danzig, Z., Liu, and L., Yan. An Evaluation of TCP Vegas by Live Emulation, 1995.
[128] W., Dargie and C., Poellabauer. Fundamentals of Wireless Sensor Networks: Theory and Practice. Wireless Communications and Mobile Computing. Wiley, 2010.
[129] N., Darwin, A., Ahmad, and O., Zainon. The potential of unmanned aerial vehicle for large scale mapping of coastal area. IOP Conference Series: Earth and Environmental Science, 18(1):012031, 2014.
[130] M.G., de la Fuente and H., Ladiod. A performance comparison of position-based routing approaches for mobile ad hoc networks. Vehicular Technology Conference (VTC), pages 1–5, October 2007.
[131] S., Deering and R., Hinden. Internet, Protocol, Version 6 (IPv6) Specification. RFC 2460 (Draft Standard), December 1998. Updated by RFCs 5095, 5722.
[132] M.T., DeGarmo. Issues concerning integration of unmanned aerial vehicles in civil airspace. Technical report, MITRE, Center for Advanced Aviation System Development, McLean, Virginia, 2004.
[133] Delair-tech. Dt-18. [Accessed 28 August 2015].
[134] David K., Delaney, Teryl G., Grubb, Paul, Beier, Larry L., Pater, and M., Hildegard Reiser. Effects of helicopter noise on Mexican spotted owls. The Journal of Wildlife Management, pages 60–76, 1999.
[135] deltadrone.
[136] M., Demmer, J., Ott, and S., Perreault. Delay-tolerant networking TCP convergence-layer protocol. RFC 7242 (Experimental), 2014.
[137] Department of Defense. Unmanned Aerial Vehicle Roadmap 2000-2025. Washington: Office of the Secretary of Defense, 2001.
[138] A., Detti, P., Loreti, N., Blefari-Melazzi, and F., Fedi. Streaming H.264 scalable video over data distribution service in a wireless environment. In Proc. IEEE Intl. Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM), pages 1–3, June 2010.
[139] Deutsches Zentrum für Luft- und Raumfahrt. LDACS1 website., 2015.
[140] DGAC.
[141] Reinhard Diestel. Graph theory. 2005. Grad. Texts in Math, 2005.
[142] Direction Generale de l'Aviation Civile. Arrêté du 11 avril 2012 relatif a la conception des aéronefs civils qui circulent sans aucune personne à bord, aux conditions de leur emploi et sur les capacités requises des personnes qui les utilisent, May 2012.
[143] Direction Generale de l'Aviation Civile. Arrêté du 11 avril 2012 relatif à l'utilisation de l'espace aérien par les aéronefs qui circulent sans personne à bord, May 2012.
[144] Directive 2014/34/EU of the European Parliament and of the Council of 26 February 2014 on the harmonisation of the laws of the member states relating to equipment and protective systems intended for use in potentially explosive atmospheres. Official Journal of the European Union, 2013. pages 309–356.
[145] F., Ducatelle, G.A., Di Caro, C., Pinciroli, F., Mondada, and L., Gambardella. Communication assisted navigation in robotic swarms: Self-organization and cooperation. In Proc. IEEE/RSJ Intl. Conf. Intelligent Robots and Systems (IROS), pages 4981–4988, September 2011.
[146] Robert C., Durst, Gregory J., Miller, and Eric J., Travis. TCP extensions for space communications. In MobiCom ‘96: Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, pages 15–26, New York, NY, USA, November 1996. ACM Press.
[147] Pierre, Dusart, Gilles, Letourneux, and Olivier, Vivolo. Differential fault analysis on A.E.S. In Jianying, Zhou, Moti, Yung, and Yongfei, Han, editors, Applied Cryptography and Network Security, volume 2846 of Lecture Notes in Computer Science, pages 293–306. Springer, Berlin, Heidelberg, October 2003.
[148] H., Eisenbeiss. The potential of unmanned aerial vehicles for mapping. In Dieter, Fritsch, editor, Photogrammetrische Woche 2011, pages 135–145. Wichmann Verlag, Heidelberg, 2004.
[149] M. E., Elaasar, M., Barbeau, E., Kranakis, and Zheyin Li. Satellite transport protocol handling bit, corruption, handoff and limited connectivity. IEEE Transactions on Aerospace and Electronic Systems, 41(2):489–502, April 2005.
[150] Bracha, Epstein and Vineet, Mehta. Free space optical communications routing performance in highly dynamic airspace environments. In Proceedings of the 2004 IEEE Aerospace Conference. volume 2, pages 1398–1406. IEEE, 2004.
[151] Ozgur, Ercetin, Michael O., Ball, and Leandros Tassiulas. Next generation satellite systems for aeronautical communications. International Journal of Satellite Communications and Networking, 22(2):157–179, 2004.
[152] C., Eschmann, C.-M., Kuo, C.-H., Kuo, and C., Boller. Unmanned aircraft systems for remote building inspection and monitoring. In Proc. Intl. Wksp. Structural Health Monitoring, pages 1179–1186, 2012.
[153] H., Eugster and S., Nebiker. UAV-based augmented monitoring: Real-time georeferencing and integration of video imagery with virtual globes. In Intl. Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, pages 1229–1235, 2008.
[154] Eurocontrol. Challenges of growth 2013. content / documents / official -documents/reports/201306-challenges-of-growth-2013-task- 4.pdf, 2013.
[155] European Aviation Safety Agency. Airworthiness certification of unmanned aircraft systems (UAS), 2009.
[156] European Aviation Safety Agency. Annex to ed decision 2012/012/r part cs-23 normal, utility, aerobatic and commuter aeroplanes, 2012. %20Amdt%203.pdf.
[157] European Aviation Safety Agency. Concept of operations for drones: A risk based approach to regulation of unmanned aircraft, 2015. EASA_concept_drone_brochure_web.pdf.
[158] Shimon, Even. Graph Algorithms. W. H. Freeman & Co., New York, NY, USA, 1979.
[159] FAA (website).
[160] FAA. Nextgen., 2013.
[161] Kevin, Fall. A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ‘03, pages 27–34, New York, NY, USA, 2003. ACM.
[162] J., Fang, T., Goff, and G., Pei. Comparison studies of OSPF-MDR, OLSR and composite routing. In Military Communications Conference, 2010 - MILCOM 2010, pages 989–994, October 2010.
[163] FCC. Role of deployable aerial communications architecture in emergency communications and recommended next steps. Technical report, Federal Communications Commission (FCC), September 2011.
[164] FCC. Deployable aerial communications architectures (daca)., 2013.
[165] Federal Aviation Administration. Systems and equipment guide for certification of part 23 airplanes and airships, 2011. AC%2023-17C.pdf.
[166] Federal Aviation Administration. Integration of unmanned aircraft systems into the national airspace system –concept of operations, September 2012. wp-content/uploads/2012/10/FAA-UAS-Conops-Version-2-0-1.pdf. (retrievedMay 2016)
[167] Federal Aviation Administration. Operation and certification of small unmanned aircraft systems, February 2015. published/media/2120-AJ60_NPRM_2-15-2015_joint_signature.pdf.
[168] David, Feldmeier. An overview of the TP++ transport protocol project. In Ahmed N., Tantawy, editor, High Performance Networks: Frontiers and Experience, volume 238 of Kluwer International Series in Engineering and Computer Science, Chapter 8. Kluwer Academic Publishers, Boston, MA, 1993.
[169] FEMA. Department of homeland security: National preparedness system. pdf/prepared/nps-description.pdf, 2011.
[170] Sally Floyd. TCP and explicit congestion notification. SIGCOMM Comput. Commun. Rev., 24(5):8–23, 1994.
[171] Fly-n-Sense
[172] Robert J., Fowler, Michael S., Paterson, and Steven L., Tanimoto. Optimal packing and covering in the plane are NP-complete. Information Processing Letters, 12(3):133–137, 1981.
[173] R., Fox. TCP big window and NAK options. RFC 1106, June 1989.
[174] Miguel, Frontera. Personal, communications, 2006/07. Pilot comments during personal communications, March/April 2007. Emails between March 20 and April 20 of 2007.
[175] Michael, Fudge, Thomas, Stagliano, and Sunny, Tsiao. Non-traditional flight safety systems and integrated vehicle health management systems. Final report, ITT Industries, Advanced Engineering and Sciences Division, 2560 Huntington Avenue, Alexandria, VA 22303, August 2003.
[176] Blake, Fuller, Jonathan, Kok, Neil A., Kelson, and Luis F., Gonzalez. Hardware design and implementation of a mavlink interface for an FPGA-based autonomous UAV flight control system. In Proceedings of the 2014 Australasian Conference on Robotics and Automation, pages 1–6. Australian Robotics & Automation Association ARAA, 2014.
[177] L., Galluccio, A., Leonardi, G., Morabito, and S., Palazzo. A MAC/routing cross-layer approach to geographic forwarding in wireless sensor networks. Ad Hoc Netw., 5(6): 872–884, 2007.
[178] Karine, Gandolfi, Christophe, Mourtel, and Francis, Olivier. Electromagnetic analysis: Concrete results. In Çetin K., Koç, David, Naccache, and Christof, Paar, editors, Cryptographic Hardware and Embedded Systems — CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 251–261. Springer, Berlin, Heidelberg, May 2001.
[179] A., Gaszczak, T., Breckon, and J., Han. Real-time people and vehicle detection from UAV imagery. Proc. SPIE, 7878:78780B–78780B–13, 2011.
[180] A., Gil, K., Passino, and J.B., Cruz. Stable cooperative surveillance with information flow constraints. IEEE Trans. Contr. Sys. Techn., 16(5):856–868.
[181] John, Gillom. Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy. The University of Chicago Press, Chicago, IL, 12 2001.
[182] Christophe, Giraud and Hugues, Thiebeauld. A survey on fault attacks. In Jean-Jacques, Quisquater, Pierre, Paradinas, Yves, Deswarte, and Anas Abou, Kalam, editors, Smart Card Research and Advanced Applications VI, volume 153 of IFIP International Federation for Information Processing, pages 159–176. Springer, US, 2004.
[183] Douglas N., Gladwin, Duane A., Asherin, and Karen M., Manci. Effects of aircraft noise and sonic booms on fish and wildlife: Results of a survey of US fish and wildlife service endangered species and ecological services field offices, refuges, hatcheries, and research centers. Technical report, DTIC Document, 1988.
[184] M., Goodrich, B., Morse, D., Gerhardt, J., Cooper, M., Quigley, J., Adams, and C., Humphrey. Supporting wilderness search and rescue using a camera-equipped mini UAV. Journal of Field Robotics, 25(1–2):89–110, 2008.
[185] Google. Balloon powered internet for everyone., 2013.
[186] A., Gordon. The American Heritage History of Flight. American Heritage, 1962.
[187] R., Goudie and Ian L., Jones. Dose-response relationships of harlequin duck behaviour to noise from low-level military jet over-flights in central Labrador. Environmental Conservation, 31(04):289–298, 2004.
[188] Sudhakar, Govindavajhala and Andrew W., Appel. Using memory errors to attack a virtual machine. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP ‘03, pages 154–165, Washington, DC, USA, May 2003. IEEE Computer Society.
[189] GRASP Laboratory
[190] Gary B., Green, Surbhi, Modi, Kevin, Lunney, and Tamara L., Thomas. Generic evaluation methods for disaster drills in developing countries. Annals of Emergency Medicine, 41(5):689–699, 2003.
[191] Frank M., Grimsley. Equivalent safety analysis using casualty expectation approach. AIAA 3rd Unmanned Unlimited Technical Conference, Workshop, and Exhibit, September 2004.
[192] Teryl G., Grubb and William W., Bowerman. Variations in breeding bald eagle responses to jets, light planes and helicopters. Journal of Raptor Research, 31(3):213–222, 1997.
[193] D.L., Gu, G., Pei, H., Ly, M., Gerla, B., Zhang, and X., Hong. UAV aided intelligent routing for ad-hoc wireless network in single-area theater. In Proc. IEEE Wireless Commun. and Net. Conf., volume 3, 2000.
[194] Bill, Gunston. Janes Aerospace Dictionary. Janes Information Group, London, England, 3 edition, 6 1988.
[195] A., Gupta and R. K., Jha. A survey of 5G network: Architecture and emerging technologies. IEEE Access, 3:1206–1232, 2015.
[196] J., Haas. A new routing protocol for the reconfigurable wireless networks. Proc. of IEEE 6th International Conference on Universal Personal Communications 97, pp. 562–566, 1997.
[197] E.C., Haas, K., Pillalamarri, C.C., Stachowiak, and M., Fields. Multimodal controls for soldier/swarm interaction. In 2011 RO-MAN, pages 223–228, July 2011.
[198] D., Hague, H.T., Kung, and B., Suter. Field experimentation of cots-based UAV networking. In MILCOM 2006–2006 IEEE Military Communications Conference, pages 1–7, October 2006.
[199] Guangjie, Han, Huihui, Xu, Trung Q., Duong, Jinfang, Jiang, and Takahiro, Hara. Localization algorithms of wireless sensor networks: A survey. Telecommunication Systems, 52(4):2419–2436, 2013.
[200] A., Handa, R.A., Newcombe, A., Angeli, and A.J., Davison. Real-time camera tracking: When is high frame-rate best? In Andrew W., Fitzgibbon, Svetlana, Lazebnik, Pietro, Perona, Yoichi, Sato, and Cordelia, Schmid, editors, ECCV (7), volume 7578 of Lecture Notes in Computer Science, pages 222–235. Springer, 2012.
[201] M., Handley, S., Floyd, J., Padhye, and J., Widmer. TCP friendly rate control (TFRC): Protocol specification. RFC 3448 (Proposed Standard), January 2003. Obsoleted by RFC 5348.
[202] Leanne, Hanson, Christopher Holmquist-Johnson, and Michelle L., Cowardin. Evaluation of the Raven SUAS to detect and monitor greater sage-grouse leks within the middle park population. Open File Report, US Geological Survey, 2014.
[203] Colin M., Harris. Aircraft operations near concentrations of birds in Antarctica: The development of practical guidelines. Biological Conservation, 125(3):309–322, 2005.
[204] Hannes Hartenstein and Kenneth P., Laberteaux. A tutorial survey on vehicular ad hoc networks. Communications Magazine, IEEE, 46(6):164–171, 2008.
[205] K., Hartmann and C., Steup. The vulnerability of UAVs to cyber attacks –An approach to the risk assessment. In 5th International Conference on Cyber Conflict (CyCon), pages 1–23, June 2013.
[206] S., Hauert, J.-C. Zufferey, and D., Floreano. Evolved swarming without positioning information: an application in aerial communication relay. Autonomous Robots, 26(1), 2009.
[207] S., Hayat, E., Yanmaz, and C., Bettstetter. Experimental analysis of multipoint-to-point UAV communications with IEEE 802.11n and 802.11ac. In Proc. IEEE Intl. Symp. Pers. Indoor, Mobile Radio Commun. (PIMRC), August 2015.
[208] S., Hayat, E., Yanmaz, and R., Muzaffar. Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint. IEEE Communications Surveys Tutorials, 18(4):2624–2661.
[209] Simon, Heimlicher, Merkourios, Karaliopoulos, Hanoch, Levy, and Thrasyvoulos, Spyropoulos. On leveraging partial paths in partially-connected networks. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.
[210] F., Heintz, P., Rudol, and P., Doherty. From images to traffic behavior –a UAV tracking and monitoring application. In Proc. Intl. Conf. Information Fusion, pages 1–8, July 2007.
[211] M., Heissenbüttel, T., Braun, T., Bernoulli, and M., Wälchli. BLR: Beaconless routing algorithm for mobile ad hoc networks. Computer Communications, 27(11):1076–1086, 2004.
[212] Janey C., Hoe. Improving the start-up behavior of a congestion control scheme for TCP. In SIGCOMM ‘96: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 270–280, New York, NY, USA, 1996. ACM.
[213] B., Hofmann-Wellenhof, H., Lichtenegger, and E., Wasle. GNSS –Global Navigation Satellite Systems: GPS, GLONASS, Galileo, and More. Springer, Vienna, 2007.
[214] J.F., Horn. Aircraft and rotorcraft system identification: Engineering methods with flight test examples (M.B. Tischler et al., 2006) [bookshelf]. IEEE Control Systems, 28(4):101–103, Aug 2008.
[215] Vikram, Hrishikeshavan, Christopher, Bogdanowicz, and Inderjit Chopra. Design, performance and testing of a quad rotor biplane micro air vehicle for multi role missions. International Journal of Micro Air Vehicles, 6(3):155–173, 2014.
[216] Hsin-Yuan Huang, A., Khendry, and T.G., Robertazzi. Layernet: A self-organizing protocol for small ad hoc networks. IEEE Transactions on Aerospace and Electronic Systems, 38(2):378–387, April 2002.
[217] L., Iannone, R., Khalili, K., Salamatian, and S., Fdida. Cross-layer routing in wireless mesh networks. 1st International Symposium on Wireless Communication Systems, pages 319–323, 2004.
[218] ICAO (website).
[219] ICAO. Technical provisions for mode s services and extended squitter. 2012.
[220] ICAO. Integration of remotely piloted aircraft systems in civil controlled airspace and selforganizing airborne networks., 2013.
[221] Integration of the CORE and EMANE Network Emulators, by Jeff Ahrenholz, Tom Goff, and Brian Adamson, IEEE MILCOM 2011, Baltimore, MD, November 2011.
[222] ICAO. Use of self organizing airborne networks to monitor commercial aircraft globally. organizing%20airborne%20networks.Revised.pdf, 2014.
[223] Richard M., Thompson III. Civilian drones, privacy, and the federal–state balance. Technical report, Congressional Research Service, 03 2015.
[224] International Civil Aviation Organization. Document 9713: International civil aviation vocabulary, 2007.
[225] International Civil Aviation Organization. Annex 8: Airworthiness of aircraft, July 2010.
[226] International Civil Aviation Organization. Advisory circular: Unmanned aircraft systems, 2011. http://ICAOwebsite.pdf.
[227] International Civil Aviation Organization. Amendment 43 to ICAO Annex 2, Rules of the Air, 2012.
[228] M., Iordanakis, D., Yannis, K., Karras, G., Bogdos, G., Dilintas, M., Amirfeiz, G., Colangelo, and S., Baiotti. Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Proceedings of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2006.
[229] Michael, Iordanakis, Dimitrios, Yannis, Kimon, Karras, Georgios, Bogdos, Georgios, Dilintas, Massimiliano, Amirfeiz, Giorgio, Colangelo, and Stefano, Baiotti. Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Citeseer, 2006.
[230] Michael, Iordanakis, Dimitrios, Yannis, Kimon, Karras, Georgios, Bogdos, Georgios, Dilintas, Massimiliano, Amirfeiz, Giorgio, Colangelo, and Stefano Baiotti. Ad-hoc routing protocol for aeronautical mobile ad-hoc networks. In Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Citeseer, 2006.
[231] Abdul, Jabbar, Erik, Perrins, and James P.G., Sterbenz. A cross-layered protocol architecture for highly-dynamic multihop airborne telemetry networks. In Proceedings of the International Telemetering Conference (ITC), San Diego, CA, October 2008.
[232] Abdul, Jabbar, Justin P., Rohrer, Victor S., Frost, and James P.G., Sterbenz. Survivable millimeter-wave mesh networks. Computer Communications, 34(16):1942–1955, October 2011.
[233] Abdul, Jabbar, Justin P., Rohrer, Andrew, Oberthaler, 43, Victor, Frost, and James P.G., Sterbenz. Performance comparison of weather disruption-tolerant crosslayer routing algorithms. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM), pages 1143–1151, Rio de Janeiro, April 2009.
[234] V., Jacobson. Compressing TCP/IP Headers for low-speed serial links. RFC 1144 (Proposed Standard), February 1990.
[235] V., Jacobson, R., Braden, and D., Borman. TCP Extensions for high performance. RFC 1323 (Proposed Standard), May 1992.
[236] V., Jacobson and R.T., Braden. TCP extensions for long-delay paths. RFC 1072, October 1988. Obsoleted by RFCs 1323, 2018.
[237] A., Jahn, M., Holzbock, J., Muller, R., Kebel, M., de Sanctis, A., Rogoyski, E., Trachtman, O., Franzrahe, M., Werner, and Fun Hu. Evolution of aeronautical communications for personal and multimedia services. IEEE Communications Magazine, 41(7):36–43, July 2003.
[238] R., Jain, F., Templin, and Kwong-Sang Yin. Analysis of l-band digital aeronautical communication systems: L-DACS1 and L-DACS2. In Aerospace Conference, 2011 IEEE, pages 1–10, March 2011.
[239] Japan UAV Association. Safety standards for commercial use unmanned 350 Aerial vehicle, for fixed wing aircraft, used in uninhabited areas, 2007. JUAVwebsite.pdf.
[240] Japan UAV Association. Safety Standards for Commercial Use Unmanned Aerial Vehicle, for FixedWing Small Aerial Vehicle, Used in Uninhabited Areas [for electrically powered], 2011. JUAVwebsite.pdf.
[241] A., Jimenez-Pacheco, D., Bouhired, Y., Gasser, J., Zufferey, D., Floreano, and B., Rimoldi. Implementation of a wireless mesh network of ultra light MAVs with dynamic routing. In IEEE Globecom Wkshps, pages 1591–1596, December 2012.
[242] Liu, Jiong, Cao, Zhigang, and K.M., Junaid. TP-satellite: A new transport protocol for satellite IP networks. IEEE Transactions on Aerospace and Electronic Systems, 45(2):502–515, April 2009.
[243] Charles J., John, Carmen M., Pancerella, Lynn, Yang, Karim, Mahrous, Gabriel R., Elkin, Adam S., Norige, Keith, Holtermann, and Jalal, Mapar. New technologies and processes for the homeland security exercise and evaluation program toolkit. In IEEE International Conference on Technologies for Homeland Security (HST), 2011, pages 446–450. IEEE, 2011.
[244] D., Johnson, Y., Hu, and D., Maltz. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC 4728 (Experimental), February 2007.
[245] Eric N., Johnson and Daniel P., Schrage. System integration and operation of a research unmanned aerial vehicle. AIAA Journal of Aerospace Computing, Information, and Communication, 1(1), January 2004.
[246] Joint Authorities for Rulemaking of Unmanned Systems WG-3 Airworthiness. Certification specification for light unmanned rotorcraft systems, October 2013. downloads/jarus_cs-lurs.pdf.
[247] Joint Authorities for Rulemaking of Unmanned Systems WG-5. RPAS C2 link. Required communication performance (C2 link RCP) concept, 2014. deliverable/category/12-external-consultation-on-jarus-c2-rcp.
[248] Joint Aviation Authority, Administrative and Guidance Material. Airworthiness and operational approval for precision rnav operations in designated European airspace, 2000.
[249] George Pierce, Jones, Leonard G., Pearlstine, and H., Franklin Percival. An assessment of small unmanned aerial vehicles for wildlife research. Wildlife Society Bulletin, 34(3):750–758, 2006.
[250] Tore B., Kallevig. Current status of work in the field of UAS related standards in Europe, 2012.
[251] A., Kandhalu, A., Rowe, R., Rajkumar, C., Huang, and C.-C. Yeh. Real-time video surveillance over IEEE 802.11 mesh networks. In Proc. IEEE Real-Time and Embedded Tech. and Appl. Symp., pages 205–214, 2009.
[252] C., Karlof and D., Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113–127, 2003.
[253] Brad, Karp and H.T., Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pages 243–254, New York, NY, USA, 2000. ACM.
[254] Matthew, Keennon, Karl, Klingebiel, Henry, Won, and Alexander, Andriukov. Development of the nano hummingbird: A tailless flapping wing micro air vehicle. In 50th AIAA Aerospace Sciences Meeting Including the New Horizons Forum and Aerospace Exposition, Nashville, TN. January, pages 9–12, 2012.
[255] F.P., Kelly, A.K., Maulloo, and D.K.H. Tan. Rate control for communication networks: Shadow, prices, proportional fairness and stability. The Journal of the Operational Research Society, 49(3):237–252, March 1998.
[256] Andrew J., Kerns, Daniel P., Shepard, Jahshan A., Bhatti, and Todd E., Humphreys. Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4):617–636, 2014.
[257] M.J., Khabbaz, C.M., Assi, and W.F., Fawaz. Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges. IEEE Communications Surveys Tutorials, 14(2):607–640, Second 2012.
[258] Joseph King. For or against. Soaring Magazine, page 47, September–October 2015.
[259] Young-Bae Ko and Nitin H., Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. Wirel. Netw., 6(4):307–321, July 2000.
[260] Paul C., Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In >Neal, Koblitz>, editor, Advances in Cryptology CRYPTO 96, volume 1109 of Lecture Notes in Computer Science, pages 104–113. Springer, Berlin, Heidelberg, August 1996.
[261] Paul C., Kocher, Joshua, Jaffe, and Benjamin, Jun. Differential power analysis. In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1999, pages 388–397, London, UK, 1999. Springer-Verlag.
[262] Matthew R., Koerner. Drones and the fourth amendment: Redefining expectations of privacy. Duke LJ, 64:1129, 2014.
[263] Oliver, Kömmerling and Markus G., Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIXWorkshop on Smartcard Technology,WOST' 99, pages 9–20, Berkeley, CA, USA, 1999. USENIX Association.
[264] Jiejun, Kong, Haiyun, Luo, Kaixin, Xu, Daniel Lihui, Gu, Mario, Gerla, and Songwu, Lu. Adaptive security for multi-layer ad-hoc networks. In Special Issue of Wireless Communications and Mobile Computing, pages 533–547. Wiley Interscience Press, 2002.
[265] M.A., Kovacina, D., Palmer, Guang, Yang, and R., Vaidyanathan. Multi-agent control algorithms for chemical cloud detection and mapping using unmanned air vehicles. In Proc. IEEE/RSJ Intl. Conf. on Intelligent Robots and Systems, volume 3, pages 2782–2788, October 2002.
[266] Olga Kozar. Towards better group work: Seeing the difference between cooperation and collaboration. English Teaching Forum, 48(2):16–23, 2010.
[267] Rajesh, Krishnan, James P.G., Sterbenz, Wesley M., Eddy, Craig, Partridge, and Mark Allman. Explicit transport error notification (ETEN) for error-prone wireless and satellite networks. Computer Networks, 46(3):343–362, 2004.
[268] Sumeet, Kumar and Aneesh, Aggarwal. Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors. In Twelfth International Symposium on High-Performance Computer Architecture, pages 212–221, February 2006.
[269] Greg, Kuperman, Lenny, Veytser, Bow-Nan, Cheng, Scott, Moore, and Aradhana, Narula- Tam. A comparison of OLSR and OSPF-MDR for large-scale airborne mobile adhoc networks. In Proceedings of the third ACM Workshop on Airborne Networks and Communications, pages 17–22. ACM, 2014.
[270] Rémi Laplace. Applications and DTN services for cooperative UAVs fleet. Thesis, Université Sciences et Technologies –Bordeaux I, December 2012.
[271] Andreas Larsson. Report on the state of the art of security in sensor networks, 2011.
[272] LDACS2 Project Team. LDACS2 Specification. article//content/documents/communications/18062009-ldacs2-design-d3-v1.2.pdf, 2009.
[273] Kevin C., Lee, Uichin, Lee, and Mario, Gerla. Survey of routing protocols in vehicular ad hoc networks. In Mohamed, Watfa, editor, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, Premier Reference Source, Chapter 8. Information Science Reference, Hershey, PA, USA, 2010.
[274] Valgene W., Lehmann and R.G., Mauermann. Status of Attwater's prairie chicken. The Journal of Wildlife Management, pages 713–725, 1963.
[275] Nancy G., Leveson. Safeware: System Safety and Computers. ACM Press, New York, NY, USA, 1995.
[276] Fan Li and Yu Wang. Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2):12–22, June 2007.
[277] Fan Li and Yu Wang. Routing in vehicular ad hoc networks: A survey. Vehicular Technology, Magazine, IEEE, 2(2):12–22, 2007.
[278] Wen-Hwa, Liao, Jang-Ping, Sheu, and Yu-Chee, Tseng. GRID: A fully location-aware routing protocol for mobile ad hoc networks. Telecommunication Systems, 18(1–3):37–60, 2001.
[279] Yun-Wei Lin, Yuh-Shyan Chen, and Sing-Ling Lee. Routing protocols in vehicular ad hoc networks: A survey and future perspectives. Journal of Information Science and Engineering, 26(3):913–932, 2010.
[280] Q., Lindsey, D., Mellinger, and V., Kumar. Construction of cubic structures with quadrotor teams. In Proc. of Robotics: Science and Systems, Los Angeles, CA, USA, June 2011.
[281] Haitao, Liu, Baoxian, Zhang, H., Mouftah, Xiaojun, Shen, and Jian Ma. Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12):103–109, December 2009.
[282] The Loon project.
[283] Luftfahrt-Bundesamt. Luftverkehrs-Ordnung vom 10. August 1963 (BGBl. I S. 652), die zuletzt durch Artikel 3 des Gesetzes vom 8. Mai 2012 (BGBl. I S. 1032) gea?ndert worden List, May 2012.
[284] J.P., Macker, ed. Simplified Multicast Forwarding. RFC 6621, May 2012.
[285] J.P., Macker, J., Dean, and W., Chao. Simplified multicast forwarding in mobile ad hoc networks. IEEE Military Communications Conference (MILCOM), Vol. 2 (2004), pp. 744–750.
[286] Joseph, Macker, Ian, Downard, Justin, Dean, and Brian Adamson. Evaluation of distributed cover set algorithms in mobile ad hoc network for simplified multicast forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 11(3):1–11, 2007.
[287] S.M., Magrabi and P.W., Gibbens. Decentralized fault detection and diagnosis in navigation systems for unmanned aerial vehicles. In IEEE Position Locations and Navigation Symposium, March 2000.
[288] David A., Maltz and Pravin Bhagwat. TCP splice for application layer proxy performance. Journal of High Speed Networks, 8(3):225–240, 1999.
[289] Md., Mamun-Or-Rashid, Muhammad Mahbub, Alam, Md. Abdur, Razzaque, and Choong Seon, Hong. Congestion avoidance and fair event detection in wireless sensor network. IEICE Transactions on Communications, E90-B(12):3362–3372, 2007.
[290] Jalal, Mapar, Keith, Holtermann, Justin, Legary, Karim, Mahrous, Katherine, Guzman, Zach, Heath, Charles J., John, Steven A., Mier, Steffen, Mueller, Carmen M., Pancerella, et al. The role of integrated modeling and simulation in disaster preparedness and emergency preparedness and response: the summit platform. In 2012 IEEE Conference on Technologies for Homeland Security (HST), pages 117–122. IEEE, 2012.
[291] Steven A., Martin and Fritz L., Knopf. Aerial survey of greater prairie chicken leks. Wildlife Society Bulletin, pages 219–221, 1981.
[292] M., Mathis, J., Mahdavi, S., Floyd, and A., Romanow. TCP selective acknowledgment options. RFC 2018 (Proposed Standard), October 1996.
[293] M., Mauve, A., Widmer, and H., Hartenstein. A survey on position-based routing in mobile ad hoc networks. IEEE Network, 15(6):30–39, 2001.
[294] David B.Mayo and J., Gordon Leishman. Comparison of the hovering efficiency of rotating wing and flapping wing micro air vehicles. Journal of the American Helicopter Society, 55(2):25001–25001, 2010.
[295] I., Maza, F., Caballero, J., Capitan, J.R., Martinez-de Dios, and A., Ollero. Firemen monitoring with multiple UAVs for search and rescue missions. In Proc. IEEE Intl. Wksp. Safety Security and Rescue Robotics (SSRR), pages 1–6, July 2010.
[296] A. J., McAuley. Reliable broadband communication using a burst erasure correcting code. SIGCOMM Comput. Commun. Rev., 20(4):297–306, 1990.
[297] Thomas S., Messerges. Using second-order power analysis to attack DPA resistant software. In Çetin K., Koç and Christof, Paar, editors, Cryptographic Hardware and Embedded Systems — CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 238–251. Springer, Berlin, Heidelberg, August 2000.
[298] Stuart D., Milner, Sohil, Thakkar, Karthikeyan, Chandrashekar, and Wei-Lun Chen. Performance and scalability of mobile wireless base-station-oriented networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(2):69–79, 2003.
[299] J.C., Mogul and S.E., Deering. Path MTU discovery. RFC 1191 (Draft Standard), November 1990.
[300] Amir, Moradi, Markus, Kasper, and Christof, Paar. Black-box side-channel attacks highlight the importance of countermeasures. In Orr, Dunkelman, editor, Topics in Cryptology –CT-RSA 2012, volume 7178 of Lecture Notes in Computer Science, pages 1–18. Springer, Berlin, Heidelberg, February 2012.
[301] F., Morbidi, R.A., Freeman, and K.M., Lynch. Estimation and control of UAV swarms for distributed monitoring tasks. In American Control Conf. (ACC), pages 1069–1075, June 2011.
[302] S., Morgenthaler, T., Braun, Zhongliang, Zhao, T., Staub, and M., Anwander. UAVNet: A mobile wireless mesh network using unmanned aerial vehicles. In Proc. IEEE Globecom Wkshps, pages 1603–1608, December 2012.
[303] Simon, Morgenthaler, Torsten, Braun, Zhongliang, Zhao, Thomas, Staub, and Markus Anwander. Uavnet: A mobile wireless mesh network using unmanned aerial vehicles. In Globecom Workshops (GC Wkshps), 2012 IEEE, pages 1603–1608. IEEE, 2012.
[304] Wojciech, Mostowski and Erik, Poll. Malicious code on Java card smartcards: Attacks and countermeasures. In Gilles Grimaud and François-Xavier Standaert, editors, Smart Card Research and Advanced Applications, volume 5189 of Lecture Notes in Computer Science, pages 1–16. Springer, Berlin, Heidelberg, September 2008.
[305] J., Moy. OSPF Version 2. RFC 2328 (Standard), April 1998. Updated by RFC 5709.
[306] James Alexander, Muir. Techniques of side channel cryptanalysis. 2001. Master's thesis, Master of Mathematics in Combinatorics and Optimization, University of Waterloo, Ontario, Canada.
[307] Chase C., Murray and Amanda G., Chu. The flying sidekick traveling salesman problem: Optimization of drone-assisted parcel delivery. Transportation Research Part C: Emerging Technologies, 54:86–109, 2015.
[308] Mostafa R.A., Nabawy and William J., Crowther. On the quasi-steady aerodynamics of normal hovering flight part ii: Model implementation and evaluation. Journal of The Royal Society Interface, 11(94):20131197, 2014.
[309] Multi-Generator (MGEN), NRL software.,php.
[310] Multi-Generator (MGEN). NRL, software,
[311] M., Naderan, M., Dehghan, and H., Pedram. Mobile object tracking techniques in wireless sensor networks. In International Conference on Ultra Modern Telecommunications Workshops, ICUMT ‘09, pages 1–8, October 2009.
[312] N., Nakka, Z., Kalbarczyk, R.K., Iyer, and J., Xu. An architectural framework for providing reliability and security support. In IEEE International Conference on Dependable Systems and Networks, pages 585–594, July 2004.
[313] Hemanth, Narra, Egemen K., Çetinkaya, and James P.G., Sterbenz. Performance analysis of AeroRP with ground station advertisements. In Proceedings of the ACM MobiHoc Workshop on Airborne Networks and Communications, pages 43–47, Hilton Head Island, SC, June 2012.
[314] NASA Safe Autonomous Systems Operations (SASO) project aosp/sasop/.
[315] NASA Unmanned Aircraft System (UAS) Traffic Management (UTM) http://utm.arc,
[316] Next Generation Air Transportation System (NextGen)
[317] Truc Anh N., Nguyen, Justin P., Rohrer, and James P.G., Sterbenz. ResTP–A Transport Protocol for FI Resilience. In Proceedings of the 10th International Conference on Future Internet Technologies (CFI), June 2015.
[318] S., Nitinawarat, G.K., Atia, and V.V., Veeravalli. Efficient target tracking using mobile sensors. In 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pages 405–408, December 2011.
[319] Oceus. Above the clouds to support public safety., 2013.
[320] Office of Naval Research. LOCUST: Autonomous, swarming UAVs fly into the future, April 2015. UAV-swarm-ONR.aspx. (Retrieved May 2016)
[321] US Department of Transportation. Unmanned aircraft system (UAS) service demand 2015–2035: Literature review and projections of future usage (dot-vntsc-dod-13-01). program/collect/service.pdf, 2013.
[322] R., Ogier and P., Spagnolo. Mobile Ad Hoc Network (MANET): Extension of OSPF using connected dominating set (CDS) flooding. RFC 5614 (Experimental), August 2009.
[323] John M.H., Olmsted and Carl G., Townsend. On the sum of two periodic functions. Two-Year College Mathematics Journal, pages 33–38, 1972.
[324] Orion product by Aurora.
[325] A., Ortiz, Fault detection and diagnosis in real-time, safety critical embedded systems: A methodology for uninhabited aerial vehicles. M.S. Thesis, Department of Aerospace Engineering, University of Illinois at Urbana-Champaign, 2007.
[326] A., Ortiz and N., Neogi, Optic flow: A computer vision approach to object avoidance on UAVs. IEEE Digital Avionics Systems Conference, Portland, Oregon, October 16–19, 2006.
[327] A., Ortiz and N., Neogi, A dynamic threshold approach to fault detection in uninhabited aerial vehicles. AIAA Guidance, Navigation, and Control Conference and Exhibit, Honolulu, HI, August 2008.
[328] T., Ostermann, J., Holsten, Y., Dobrev, and D., Moormann. Control concept of a tiltwing UAV during low speed manoeuvring. In Proceedings of the 28th International Congress of the Aeronautical Sciences: ICAS, Brisbane, Australia, 2012.
[329] J., Ott and D., Kutscher. Drive-thru internet: IEEE 802.11b for “automobile” users. In 23rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), volume 1, page 373, March 2004.
[330] Cüneyt, Özveren, Robert, Simcoe, and George, Varghese. Reliable and efficient hop-byhop flow control. In SIGCOMM ‘94: Proceedings of the Conference on Communications Architectures, Protocols, and Applications, pages 89–100, New York, NY, USA, 1994. ACM.
[331] R.C., Palat, A., Annamalai, and J.H., Reed. Cooperative relaying for ad hoc ground networks using swarms. In Proc. IEEE Milit. Comm. Conf. (MILCOM' 05), volume 3, pages 1588–1594, October 2005.
[332] Richard B., Parker. Definition of privacy. Rutgers L. Rev., 27:275, 1973.
[333] Craig, Partridge. Gigabit Networking. Addison-Wesley Longman Publishing Co., Boston, MA, USA, 1994.
[334] Colin Percival. Cache missing for fun and profit. In Proceedings of BSDCan 2005, 2005.
[335] C., Perkins, E., Belding-Royer, and S., Das. Ad hoc on-demand distance vector (AODV) routing. RFC 3561 (Experimental), July 2003.
[336] Charles E., Perkins and Elizabeth M., Royer, Ad-hoc on-demand distance vector routing. In Proceedings of the 2nd IEEEWorkshop on Mobile Computing Systems and Applications, 1997.
[337] Charles E., Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distancevector routing (DSDV) for mobile computers. In ACM SIGCOMM, pages 234–244, London, 1994.
[338] Charles E., Perkins et al. Ad hoc Networking, Volume 1. Addison-Wesley, Reading, 2001.
[339] Kevin, Peters, Abdul, Jabbar, Egemen K., Çetinkaya, and James P.G., Sterbenz. A geographical routing protocol for highly-dynamic aeronautical networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 492–497, Cancun, Mexico, March 2011.
[340] J., Postel. User datagram protocol. RFC 768 (Standard), August 1980.
[341] J., Postel. Transmission control protocol. RFC 793 (Standard), September 1981. Updated by RFCs 1122, 3168.
[342] Power beaming flight demonstration. imagegallery/Power-Beaming/EC02-0232-13.html. (Retrieved May 2016)
[343] Pham Xuan, Quang and Richard B, Lanctot. A line transect model for aerial surveys. Biometrics, pages 1089–1102, 1991.
[344] Jean-Jacques, Quisquater and David, Samyde. ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In Isabelle Attali and Thomas Jensen, editors, Smart Card Programming and Security, volume 2140 of Lecture Notes in Computer Science, pages 200–210. Springer, Berlin, Heidelberg, September 2001.
[345] K., Ramakrishnan, S., Floyd, and D., Black. The addition of explicit congestion notification (ECN) to IP. RFC 3168 (Proposed Standard), September 2001.
[346] K. K., Ramakrishnan and Raj, Jain. A binary feedback scheme for congestion avoidance in computer networks. ACM Transactions on Computer Systems, 8(2):158–181, 1990.
[347] S., Ramanathan and Martha Steenstrup. A survey of routing techniques for mobile communications networks. Mob. Netw. Appl., 1(2):89–104, October 1996.
[348] V., Ramasubramanian, Z., Haas, and E., Sirer, SHARP: A hybrid adaptive routing protocol for mobile ad hoc networks. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2003.
[349] Christian Rechberger and Elisabeth Oswald. Practical template attacks. In ChaeHoon Lim and Moti, Yung, editors, Information Security Applications, volume 3325 of Lecture Notes in Computer Science, pages 440–456. Springer, Berlin, Heidelberg, August 2004.
[350] Y., Rekhter, T., Li, and S., Hares. A border gateway protocol 4 (BGP-4). RFC 4271 (Draft Standard), January 2006.
[351] L., Reynaud and T., Rasheed. Deployable aerial communication networks: Challenges for futuristic applications. In Proc. ACM Symp. Perf. Eval. Wireless Ad Hoc, Sensor, and Ubiquitous Networks, pages 9–16, 2012.
[352] L., Reynaud, T., Rasheed, and S., Kandeepan. An integrated aerial telecommunications network that supports emergency traffic. In Proc. Intl. Symp. Wireless Personal Multimedia Commun. (WPMC), pages 1–5, October 2011.
[353] K., Ro, J.-S., Oh, and L., Dong. Lessons learned: Application of small UAV for urban highway traffic monitoring. American Inst. of Aeronautics and Astronautics, pages 1–19, 2007.
[354] W., Robinson and A., Lauf. Aerial MANETs: Developing a resilient and efficient platform for search and rescue applications. Journal of Commun., 8(4):216–224, 2013.
[355] Justin P., Rohrer, Egemen K., Çetinkaya, Hemmanth, Narra, Dan, Broyles, Kevin, Peters, and James P.G., Sterbenz. AeroRP performance in highly-dynamic airborne networks using 3D Gauss–Markov mobility model. In Proceedings of the IEEE Military Communications Conference (MILCOM), pages 834–841, Baltimore, MD, November 2011.
[356] Justin P., Rohrer, Abdul, Jabbar, Egemen K. Çetinkaya, Erik, Perrins, and James P.G., Sterbenz. Highly-dynamic cross-layered aeronautical network architecture. IEEE Transactions on Aerospace and Electronic Systems, 47(4):2742–2765, October 2011.
[357] Justin P., Rohrer, Abdul, Jabbar, Egemen K., Çetinkaya, and James P.G., Sterbenz. Airborne telemetry networks: challenges and solutions in the ANTP Suite. In Proceedings of the IEEE Military Communications Conference (MILCOM), pages 74–79, San Jose, CA, November 2010.
[358] Justin P., Rohrer, Abdul, Jabbar, Erik, Perrins, and James P.G., Sterbenz. Cross-layer architectural framework for highly-mobile multihop airborne telemetry networks. In Proceedings of the IEEE Military Communications Conference (MILCOM), pages 1–9, San Diego, CA, November 2008.
[359] Justin P., Rohrer, Kamakshi Sirisha, Pathapati, Truc Anh N., Nguyen, and James P.G., Sterbenz. Opportunistic transport for disrupted airborne networks. In Proceedings of the IEEE Military Communications Conference (MILCOM), pages 737–745, Orlando, FL, November 2012.
[360] Justin P., Rohrer and James P.G., Sterbenz. Performance and disruption tolerance of transport protocols for airborne telemetry networks. In Proceedings of the International Telemetering Conference (ITC), Las Vegas, NV, October 2009.
[361] Allison, Ryan, Xiao, Xiao, Shivakumar, Rathinam, John, Tisdale, Marco, Zennaro, Derek, Caveney, Raja, Sengupta, and J., Karl Hedrick. A modular software infrastructure for distributed control of collaborating UAVs. AIAA Conference on Guidance, Navigation, and Control, 2006.
[362] A., Ryan, M., Zennaro, A., Howell, R., Sengupta, and J.K., Hedrick. An overview of emerging results in cooperative UAV control. In Proc. IEEE Conf. Decision and Control, volume 1, pages 602 –607, December 2004.
[363] Safety and Airspace Regulation Group, United Kingdom. CAP 393: Air Navigation 2009: The Order and the Regulations, 2015. %20edition%20Amendment%201%20April%202015.pdf.
[364] Safety and Airspace Regulation Group, United Kingdom. CAP 722: Unmanned aircraft system operations in UK airspace guidance, 2015. %20Sixth%20Edition%20March%202015.pdf.
[365] Y.E., Sagduyu and A., Ephremides. On joint MAC and network coding in wireless ad hoc networks. IEEE Transactions on Information Theory, 53(10):3697–3713, October 2007.
[366] E., Sakhaee and A., Jamalipour. The global in-flight internet. IEEE Journal on Selected Areas in Communications, 24(9):1748–1757, September 2006.
[367] E., Sakhaee, A., Jamalipour, and Nei, Kato. Aeronautical ad hoc networks. In IEEE Wireless Communications and Networking|Conference, 2006. WCNC 2006, volume 1, pages 246–251, April 2006.
[368] J., Sanchez, P., Ruiz, and R., Marin-Perez. Beacon-less geographic routing made practical: Challenges, design guidelines, and protocols. IEEE Communications Magazine, 47(8):85–91, August 2009.
[369] J.A., Sanchez, R., Marin-Perez, and P.M., Ruiz. BOSS: Beacon-less on demand strategy for geographic routing in wireless sensor networks. In IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pages 1–10, October 2007.
[370] Francesc Sardà-Palomera, Gerard, Bota, Carlos, Vinolo, Oriol, Pallares, Victor, Sazatornil, Lluis, Brotons, Spartacus, Gomariz, and Francesc Sardà. Fine-scale bird monitoring from light unmanned aircraft systems. Ibis, 154(1):177–183, 2012.
[371] Akira Sato. Civil UAV applications in Japan and related safety and certification, 2003. http://Yamahawebsite.pdf.
[372] SC-228. Overview, 2013. http://RTCAwebsite.pdf.
[373] SC-228. Command and control link whitepaper, 2014. contentid=178.
[374] SC-228. Detect and avoid whitepaper, 2014.
[375] M., Schnell, U., Epple, D., Shutin, and N., Schneckenburger. LDACS: future aeronautical communications for air-traffic management. Communications Magazine, IEEE, 52(5):104–110, May 2014.
[376] Michael, Schnell, Ulrich, Epple, Dmitriy, Shutin, and Nicolas Schneckenburger. LDACS: Future aeronautical communications for air-traffic management. Communications Magazine, IEEE, 52(5):104–110, 2014.
[377] S., Schoenung, S., Dunagan, D., Sullivan, J., Brass, and S., Wegener. UAV over-the-horizon disaster management demonstration projects. Technical report, University of Southampton, 2000.
[378] Michael A., Schroeder, Kenneth M., Giesen, and Clait E., Braun. Use of helicopters for estimating numbers of greater and lesser prairie-chicken leks in eastern Colorado. Wildlife Society Bulletin, pages 106–113, 1992.
[379] H., Schulzrinne, S., Casner, R., Frederick, and V., Jacobson. RTP: A transport protocol for real-time applications. RFC 3550 (Standard), July 2003. Updated by RFC 5506.
[380] K., Scott and S., Burleigh. Bundle protocol specification. RFC 5050 (Experimental), November 2007.
[381] I., Sher, D., Levinzon-Sher, and E., Sher. Miniaturization limitations of hcci internal combustion engines. Applied Thermal Engineering, 29(2):400–411, 2009.
[382] Sergey, Shkarayev, Gunjan, Maniar, and Alexander V., Shekhovtsov. Experimental and computational modeling of the kinematics and aerodynamics of flapping wing. Journal of Aircraft, 50(6):1734–1747, 2013.
[383] Sergei Skorobogatov. Tamper resistance and hardware security.∼sps32/ PartII_030214.pdf, February 2014. [Accessed 3 May 2014.]
[384] Sergei P., Skorobogatov and Ross J., Anderson. Optical fault induction attacks. In Burton S., Kaliski, Çetin K., Koç, and Christof, Paar, editors, Cryptographic Hardware and Embedded Systems –CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 2–12. Springer, Berlin, Heidelberg, 2003.
[385] Therese Skrzypietz. Unmanned aircraft systems for civilian missions. Technical Report BIGS Policy Paper No. 1, Brandenburg Institute for Society and Security, February 2012.
[386] Ulrich, Epple, Snjezana, Gligorevic, and Michael, Schnell. The ldacs1 physical layer design. In Dr. Simon, Plass, editor, Future Aeronautical Communications. InTech, 2011.
[387] South African Civil Aviation Authority. Civil Aviation Act, 2009 (Act No. 13, of 2009), 2009.
[388] South African Civil Aviation Authority. Frequently asked questions for unmanned aircraft systems in South Africa, 2014. http://SouthAfricaCAwebsite.pdf.
[389] Raphael, Spreitzer and Benoit, Gérard. Towards more practical time-driven cache attacks. In David Naccache and Damien, Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things, volume 8501 of Lecture Notes in Computer Science, pages 24–39, July 2014.
[390] N.K., Sreelaja and G.A., Vijayalakshmi Pai. Swarm intelligence based key generation for stream cipher. Security and Communication Networks, 4(2):181–194, 2011.
[391] Mark V., Stalmaster and James L., Kaiser. Flushing responses of wintering bald eagles to military activity. The Journal of Wildlife Management, pages 1307–1313, 1997.
[392] Martha, Steenstrup. Routing in Communication Networks. Prentice Hall, 1995.
[393] M.E., Steenstrup, Routing under uncertainty: A comparative study, IEEE WCNC 2000, Chicago, September 2000.
[394] R., Steffen and W., Forstner. On visual real time mapping for unmanned aerial vehicles. In Proc. Congress of the Intl. Soc. Photogrammetry and Remote Sensing (ISPRS), pages 57–62, 2008.
[395] James P.G., Sterbenz, David, Hutchison, Egemen K., Çetinkaya, Abdul, Jabbar, Justin P., Rohrer, Marcus, Schöller, and Paul, Smith. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 54(8):1245–1265, 2010.
[396] James P.G., Sterbenz, David, Hutchison, Egemen K., Çetinkaya, Abdul, Jabbar, Justin P., Rohrer, Marcus, Schöller, and Paul, Smith. Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance (invited paper). Telecommunication Systems, 56(1):17–31, 2014.
[397] James P.G., Sterbenz and Joseph D., Touch. High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication. Wiley, 1st edition, May 2001.
[398] James P.G., Sterbenz. Drones in the smart city and IoT: Protocols, resilience, benefits, and risks. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use.
[399] James P.G., Sterbenz, Rajesh, Krishnan, Regina Rosales, Hain, Alden W., Jackson, David, Levin, Ram, Ramanathan, and John, Zao. Survivable mobile wireless networks: Issues, challenges, and research directions. In Proceedings of the 1st ACM Workshop on Wireless Security (WiSe), pages 31–40, Atlanta, GA, September 2002.
[400] James P.G., Sterbenz and Gurudatta M., Parulkar. AXON: Application-oriented lightweight transport protocol design. In Proceedings of the Tenth International Conference on Computer Communication (ICCC), pages 379–387, New Delhi, India, November 1990. Narosa Publishing House.
[401] W., Stevens. TCP Slow Start, congestion avoidance, fast retransmit, and fast recovery algorithms. RFC 2001 (Proposed Standard), January 1997. Obsoleted by RFC 2581.
[402] M., Strohmeier, V., Lenders, and I., Martinovic. On the security of the automatic dependent surveillance-broadcast protocol. Communications Surveys Tutorials, IEEE, 17(2):1066–1087, Second quarter 2015.
[403] Martin, Strohmeier, Matthias, Schafer, Vincent, Lenders, and Ivan Martinovic. Realities and challenges of nextgen air traffic management: The case of ads-b. Communications Magazine, IEEE, 52(5):111–118, 2014.
[404] P.B., Sujit and D., Ghose. Search using multiple UAVs with flight time constraints. IEEE Trans. Aerospace and Electronic Systems, 40(2):491–509, April 2004.
[405] Sun and Lisa Grow. Smart growth in dumb places: Sustainability, disaster, and the future of the American city. In BYU Law Review (symposium), Forthcoming, 2011.
[406] M., Suresh and D., Ghose. Role of information and communication in redefining unmanned aerial vehicle autonomous control levels. In Proceedings of the Institution of Mechanical, Engineers, Part G: Journal of Aerospace Engineering, 224(2):171–197, 2010.
[407] Fabrice Tchakountio and Ram Ramanathan. Tracking Highly Mobile Endpoints. In Proceedings of the 4th ACM International Workshop on Wireless Mobile Multimedia, WOWMOM ‘01, pages 83–94, New York, NY, USA, 2001. ACM.
[408] Fabrice Tchakountio and Ram Ramanathan. Anticipatory routing for highly mobile endpoints. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 94–101, Washington, DC, 2004.
[409] Tyson, Thedinger, Abdul, Jabbar, and James P.G., Sterbenz. Store and haul with repeated controlled flooding. In Second International IEEE Workshop on Mobile Computing and Networking Technologies (WMCNT), pages 728–733, Moscow, October 2010.
[410] Nils Ole, Tippenhauer, Christina, Pöpper, Kasper Bonne, Rasmussen, and Srdjan, Capkun. On the requirements for successful GPS spoofing attacks. In Proc. of the 18th ACM Conference on Computer and Communications Security, CCS ‘11, pages 75–86, New York, NY, USA, 2011. ACM.
[411] Abhishek, Tiwari, Anurag, Ganguli, and Ashwin, Sampath. Towards a mission planning toolbox for the airborne network: Optimizing ground coverage under connectivity constraints. In Aerospace Conference, 2008 IEEE, pages 1–9. IEEE, 2008.
[412] T., Tomic, K., Schmid, P., Lutz, A., Domel, M., Kassecker, E., Mair, I.L., Grixa, F., Ruess, M., Suppa, and D., Burschka. Toward a fully autonomous UAV: Research platform for indoor and outdoor urban search and rescue. IEEE Robotics Automation Magazine, 19(3):46–56, Sept 2012.
[413] Transport Canada. Advisory circular: Guidance material for operating unmanned air vehicle systems under an exemption, November 2014. opssvs/ac-600-004-2136.html.
[414] Transport Canada. Canadian civil aviation regulations (SOR/96-433), August 2015.
[415] Tony, Udelhoven. Selecting proximity sensors for diverse applications, September 2012. 2f48d26acd6c636a474390c3edaaeb11.html. (Retrieved May 2016)
[416] D., Uhlig, K., Bhamidipati, and N., Neogi, A safety-oriented approach to designing UAVs using COTS technology. IEEE Digital Avionics Systems Conference, Portland, Oregon, October 16–19, 2006.
[417] D., Uhlig, N., Kiyavash, and N., Neogi. Fault tolerant triangulation in distributed aircraft networks with automatic dependent surveillance broadcast. International Journal of Systems, Control and Communications, C., Hadjicostis, C., Langbort, N., Martins, and S., Yuksel (eds.), June 2009.
[418] United States Government. Title 14 code of federal regulations. http://14CFR.pdf.
[419] United States Government. Title 14 code of federal regulations, part 21 certification procedures for products and parts.;node=14 %3A1.
[420] United States Government. Title 14 code of federal regulations, part 23 airworthiness standards: Normal, utility, acrobatic, and commuter category airplanes. cgi-bin/text-idx?SID=9f1208983b800adf381aec3ec240f673truept14.1.23rgn=div5.
[421] United States Government. Title 14 code of federal regulations, part 39 airworthiness directives.;rgn=div5;view=text;node=14%3A1.; idno=14;sid=df85233338549812773109cf75d37dfc;cc=ecfr.
[422] United States Government. Title 14 code of federal regulations, subchapter b: Airmen. 14CIsubchapD.tpl.
[423] United States Government. Title 14 code of federal regulations, subchapter g: Air carriers and operators for compensation or hire: Certification and operations. text-idx?tpl=/ecfrbrowse/Title14/14cfr121_main_02.tpl.
[424] Bill Vaglienti. Communications for the piccolo avionics. Cloud Cap Technology Technical Document, September 2006. ﹛ALSO ANDRES 3﹜
[425] Bill Vaglienti. Piccolo. Control laws for 2.0.x. Cloud Cap Technology Technical Document, March 2007.
[426] Bill Vaglienti and Ross Hoag. A highly integrated UAV avionics system. Cloud Cap Technology Technical Document, April 2003. ﹛ALSO ANDRES 2﹜
[427] A., Vahdat and D., Becker. Epidemic routing for partially-connected ad hoc networks. Technical Report CS-200006, Duke University, April 2000.
[428] Kimon P., Valavanis and George J., Vachtsevanos. Handbook of Unmanned Aerial Vehicles. Springer Publishing Company, Inc., 2014.
[429] Alvaro, Valcarce, Tinku, Rasheed, Karina, Gomez, Sithamparanathan, Kandeepan, Laurent, Reynaud, Romain, Hermenier, Andrea, Munari, Mihael, Mohorcic, Miha, Smolnikar, and Isabelle, Bucaille. Airborne base stations for emergency and temporary events. In R., Dhaou, A., Beylot, M., Montpetit, D., Lucani, and L., Mucchi, editors, Personal Satellite Services, volume 123 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 13–25. Springer International Publishing, 2013.
[430] Bertold Van den, Bergh, Tom, Vermeulen, and Sofie, Pollin. Analysis of harmful interference to and from aerial IEEE 802.11 systems. In Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, DroNet ‘15, pages 15–19, New York, NY, USA, 2015. ACM.
[431] Athanasios V., Vasilakos, Yan, Zhang, and Thrasyvoulos, Spyropoulos. Delay Tolerant Networks: Protocols and Applications. CRC Press, 2012.
[432] Dennis, Vermoen, Marc, Witteman, and Georgi N., Gaydadjiev. Reverse engineering Java card applets using power analysis. In Damien, Sauveron, Konstantinos, Markantonakis, Angelos, Bilas, and Jean-Jacques, Quisquater, editors, Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, volume 4462 of Lecture Notes in Computer Science, pages 138–149. Springer, Berlin, Heidelberg, May 2007.
[433] Éric, Vétillard and Anthony, Ferrari. Combined attacks and countermeasures. In Smart Card Research and Advanced Application, volume 6035 of Lecture Notes in Computer Science, pages 133–147. Springer, Berlin, Heidelberg, April 2010.
[434] P., Vincent and I., Rubin. A framework and analysis for cooperative search using UAV swarms. In Proc. ACM Symp. Appl. Comp., 2004.
[435] S., Waharte, N., Trigoni, and S.J., Julier. Coordinated search with a swarm of UAVs. In Proc. IEEE Wkshp. Sensor, Mesh and Ad Hoc Commun. and Networks (SECON Workshops ‘09), pages 1–3, June 2009.
[436] Colin D., Walter and Susan, Thompson. Distinguishing exponent digits by observing modular subtractions. In David, Naccache, editor, Topics in Cryptology — CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 192–207. Springer, Berlin, Heidelberg, April 2001.
[437] Chieh-Yih, Wan, Shane B., Eisenman, and Andrew T., Campbell. CODA: Congestion detection and avoidance in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys), pages 266–279, November 2003.
[438] Yan, Wan, Kamesh, Namuduri, Yi, Zhou, and Shengli, Fu. A smooth-turn mobility model for airborne networks. IEEE Transactions on Vehicular Technology, 62(7):3359–3370, 2013.
[439] Ruhai, Wang and S., Horan. Protocol testing of SCPS-TP over NASA's ACTS asymmetric links. IEEE Transactions on Aerospace and Electronic Systems, 45(2):790–798, April 2009.
[440] David H., Ward, Robert A., Stehn, Wallace P., Erickson, and Dirk V., Derksen. Response of fall-staging brant and Canada geese to aircraft overflights in southwestern Alaska. The Journal of Wildlife Management, pages 373–381, 1999.
[441] Adam C., Watts, Vincent G., Ambrosia, and Everett A., Hinkley. Unmanned aircraft systems in remote sensing and scientific research: Classification and considerations of use. Remote Sensing, 4(6):1671–1692, 2012.
[442] Adam C., Watts, John H., Perry, Scot E., Smith, Matthew A., Burgess, Benjamin E., Wilkinson, Zoltan, Szantoi, Peter G., Ifju, and H., Franklin Percival. Small unmanned aircraft systems for low-altitude aerial surveys. The Journal of Wildlife Management, 74(7):1614–1619, 2010.
[443] Roland Everett Weibel. Safety considerations for operation of different classes of unmanned aerial vehicles in the national airspace system. PhD thesis, Massachusetts Institute of Technology, 2005.
[444] Roland E., Weibel and Jr. R., John Hansman. Safety considerations for operation of different classes of UAVs. In The NAS. AIAA 3rd “Unmanned Unlimited” Technical, Conference, Workshop, and Exhibit, 1:341–351, September 2004.
[445] A., Weinert, P., Erickson, H., Reis, P., Breimyer, T., Hackett, M., Samperi, J., Huff, C., Parra, E., Stoekl, P., Zundritsch, R., Morris, I., Iakimenko, E., Petschauer, and S., Bilen. Enabling communications in disadvantage environments: An airborne remote communication (ARC) platform. In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pages 797–803, November 2013.
[446] Alan, Westin. Privacy and Freedom. The Bodley Head Ltd, London, England, 4 1970.
[447] WG-93 Light Remotely Piloted Aircraft Systems Operations.WG93 on lightweight RPAS, April 2012.
[448] M., Wheeler, B., Schrick, W., Whitacre, M., Campbell, R., Rysdyk, and R., Wise. Cooperative tracking of moving targets by a team of autonomous UAVs. In IEEE/AIAA 25th Digital Avionics Systems Conference, pages 1–9, October 2006.
[449] Wilde Solmecke. Die rechtlichen Probleme des Einsatzes von zivilen Drohnen, January 2014. zivilen-drohnen-49854/.
[450] Mark P., Witton and Michael B., Habib. On the size and flight diversity of giant pterosaurs, the use of birds as pterosaur analogues and comments on pterosaur flightlessness. PloS One, 5(11):e13982, 2010.
[451] Anthony D., Wood and John A., Stankovic. Denial of service in sensor networks. Computer, 35:54–62, October 2002.
[452] Robert J., Wood. Liftoff of a 60mg flapping-wing mav. In IEEE/RSJ International Conference on Intelligent Robots and Systems, 2007. IROS 2007. pages 1889–1894. IEEE, 2007.
[453] Tom, Wypych, Radley, Angelo, and Falko Kuester. Airgsm: An, unmanned, flying gsm cellular base station for flexible field communications. In Aerospace Conference, 2012 IEEE, pages 1–9. IEEE, 2012.
[454] Xamen Technologies
[455] E., Xargay, V., Dobrokhodov, I., Kaminer, A.M., Pascoal, N., Hovakimyan, and C., Cao. Timecritical cooperative control of multiple autonomous vehicles: Robust distributed strategies for path-following control and time-coordination over dynamic communications networks. IEEE Control Systems, 32(5):49–73, October 2012.
[456] Jim Anderson Xilinx. Case study: Secure FPGA technology enables UAV communications and control., April 2011. [Accessed 3 May 2014.]
[457] Enyang, Xu, Zhi, Ding, and S., Dasgupta. Target tracking and mobile sensor navigation in wireless sensor networks. IEEE Transactions on Mobile Computing, 12(1):177–186, January 2013.
[458] E., Yanmaz and H., Guclu. Stationary and mobile target detection using mobile wireless sensor networks. In Proc. IEEE Conf. Computer Commun. Wksps (INFOCOM), pages 1–5, 2010.
[459] E., Yanmaz, S., Hayat, J., Scherer, and C., Bettstetter. Experimental performance analysis of two-hop aerial 802.11 networks. In Proc. IEEE Wireless Commun. and Net. Conf., April 2014.
[460] E., Yanmaz, R., Kuschnig, and C., Bettstetter. Achieving air–ground communications in 802.11 networks with three-dimensional aerial mobility. In Proc. IEEE Int. Conf. Computer Commun. (INFOCOM), Mini Conference, April 2013.
[461] Attila Altay, Yavuz, Fatih, Alagoz, and Emin, Anarim. HIMUTSIS: Hierarchical multitier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes. In Albert, Levi, Erkay, Savas, Hüsnü, Yenigün, Selim, Balcısoy, and Yücel, Saygın, editors, Computer and Information Sciences –ISCIS 2006, volume 4263 of Lecture Notes in Computer Science, pages 434–444. Springer, Berlin, Heidelberg, 2006.
[462] S.P., Yeong, L.M., King, and S.S., Dol. A review on marine search and rescue operations using unmanned aerial vehicles. World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 9(2):390–393, 2015.
[463] Harold, Youngren, Steve, Jameson, and Brian, Satterfield. Design of the samarai monowing rotorcraft nano air vehicle. In Proceedings of the American Helicopter Society AHS 65th Annual Forum and Technology Display, 2009.
[464] M., Yuksel, R., Pradhan, and S., Kalyanaraman. An implementation framework for trajectory-based routing in ad hoc networks. Ad Hoc Networks, 4(1):125–137, 2006.
[465] Pengcheng, Zhan, D.W., Casbeer, and A.L., Swindlehurst. A centralized control algorithm for target tracking with UAVs. In Conference Record of the Thirty-Ninth Asilomar Conference on Signals, Systems and Computers, pages 1148–1152, October 2005.
[466] Zhensheng, Zhang. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges. Communications Surveys & Tutorials, IEEE, 8(1):24–37, 2006.
[467] W., Zhao, M., Ammar, and E., Zegura. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ‘04, pages 187–198, New York, NY, USA, 2004. ACM.
[468] Dimitrios, Zorbas, Tahiry, Razafindralambo, Di, Puglia Pugliese, Luigi, and Francesca Guerriero. Energy efficient mobile target tracking using flying drones. Procedia Computer Science, 19(0):80–87, 2013.
[469] Yi, Zou and K., Chakrabarty. Distributed mobility management for target tracking in mobile sensor networks. IEEE Transactions on Mobile Computing, 6(8):872–887, August 2007.
[470] S., Shirazipourazad, P., Ghosh, and A., Sen. On connectivity of airborne networks in presence of region-based faults, in Proceedings of the Military Communications Conference (MILCOM), pp. 197–2002, IEEE 2011.
[471] D., Hay, S., Shirazipourazad, and A., Sen. Optical tracking of multiple targets using UAVs, in International Conference on Combinatorial Optimization and Applications, pp. 750–763, Springer 2014.
[472] W.J., Sutherland. Ecological Census Techniques –A Handbook. Cambridge University Press, 2005.
[473] Rebecca A., Efroymson, I.I., Suter, W., Glenn, Winifred H., Rose, and Sarah, Nemeth. Ecological risk assessment framework for low-altitude aircraft overflights: I.Planning the analysis and estimating exposure. Risk Analysis, 21(2):251–262, 2001.
[474] D.T., Booth, S.E., Cox, G.E., Simonds, and B., Elmore. Efficacy of two variations on an aerial lekcount method for greater sage-grouse. Western North American Naturalist, 69:413–416, 2009.