C. G. Krishna and R. R. Murphy, A review on cybersecurity vulnerabilities for unmanned aerial vehicles, IEEE Int. Symp. on Safety, Security and Rescue Robotics (SSRR), 2017.

V. L. Thing and J. Wu, Autonomous vehicle security: A taxonomy of attacks and defences, IEEE iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData, 2016.

G. Choudhary, V. Sharma, I. Gupta, and T. You, Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives, 2018.

J. Andersson, Attacking DSMx Spread Spectrum Frequency Hopping Drone Remote Control with SDR(Software Defined Radio), PacSec, 2016.

S. Bunse and C. Plotz, Security Analysis of Drone Communication Protocols, Engineering Secure Software and Systems, 2018.

K. Domin, E. Marin, and I. Symeonidis, Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocol, vol.7

D. Mototolea and C. Stolk, Software Defined Radio for Analyzing Drone Communication Protocols, Int. Conf. on Communications (COMM), 2018.

E. Rivera, R. Baykov, and G. Gu, A study on unmanned vehicles and cyber security, Texas (Univ, 2014.

D. Mototolea and C. Stolk, Detection and Localization of Small Drones Using Commercial Off-the-Shelf FPGA Based Software Defined Radio Systems, Int. Conf. on Communications (COMM), 2018.

H. Shin, K. Choi, Y. Park, J. Choi, and Y. Kim, Security Analysis of FHSS-type Drone Controller, SIP, vol.9503, 2016.

R. J. Bamberger, J. G. Moore, R. P. Goonasekeram, and D. H. Scheidt, Autonomous geo location of RF emitters using small, unmanned platforms, Johns Hopkins APL technical digest, vol.32, issue.3, pp.636-646, 2013.

O. Bar-shalom and A. J. Weiss, Emitter geolocation using single moving receiver, Signal Processing, vol.105, pp.70-83, 2014.

A. Jadon, Z. T. Williams, C. Kafka, H. Rotta, S. Roy et al., A Database System Architecture for Air-to-Ground UAS Link Characterization, AIAA Info. Systems-AIAA Infotech@Aerospace, 2018.

P. Scerri, R. Glinton, S. Owens, D. Scerri, and K. Sycara, Geolocation of RF emitters by many UAVs, AIAA Infotech@ Aerospace Conf. and Exhibit, p.2858, 2007.

Z. Wang, E. Blasch, G. Chen, D. Shen, X. Lin et al., A lowcost, near-real-time two-UAS-based UWB emitter monitoring system, IEEE Aerospace and Electronic Systems Mag, vol.30, issue.11, pp.4-11, 2015.

W. D. Watson, S. Huntsman, and J. T. Dolan, Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs), IEEE Military Communications Conf. (MILCOM), pp.291-296, 2017.

T. Ebinuma, gps-sdr-sim

L. Huang and Q. Yang, GPS SPOOFING -Low-cost GPS simulator, DEF CON 23, 2015.

E. Horton and P. Ranganathan, Development of a GPS spoofing apparatus to attack a DJI Matrice 100 Quadcopter, The Journal of Global Positioning Systems, vol.16, issue.1, p.9, 2018.

A. Luo, Drones Hijacking -Multi-dimensional attack vectors and countermeasures, DEF CON 24, 2016.

A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, Unmanned Aircraft Capture and Control Via GPS Spoofing: Unmanned Aircraft Capture and Control, Journal of Field Robotics, vol.31, issue.4, pp.617-636, 2014.

A. Costin and A. Francillon, Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices, pp.1-12, 2012.

Z. Feng, N. Guan, M. Lv, W. Liu, Q. Deng et al., Efficient drone hijacking detection using onboard motion sensors, Design, Automation & Test in Europe Conf. (DATE), 2017.

Y. Liu, S. Li, Q. Fu, and Z. Liu, Impact assessment of GNSS spoofing attacks on ins/GNSS integrated navigation system, Sensors, vol.18, issue.5, p.1433, 2018.

H. Sedjelmaci, S. M. Senouci, and N. Ansari, A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks, IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol.48, issue.9, pp.1594-1606, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01557953

T. Rosa, GNSS/GPS Radio Hacking -From Beautiful Equations to Serious Threats, QuBit, 2016.

N. Shijith, P. Poornachandran, V. G. Sujadevi, and M. M. Dharmana, Spoofing technique to counterfeit the GPS receiver on a drone, Int. Conf. on Technological Advancements in Power and Energy ( TAP Energy), pp.1-3, 2017.

M. Strohmeier, V. Lenders, and I. Martinovic, On the security of the automatic dependent surveillance-broadcast protocol, IEEE Com. Surveys & Tutorials, vol.17, issue.2, pp.1066-1087, 2015.

V. Brik, S. Banerjee, S. Gruteser, and M. Oh, Wireless device identification with radiometric signatures, 14th ACM Int. conf. on Mobile computing and networking, pp.116-127, 2008.

S. Camurati, G. Poeplau, M. Muench, A. Hayes, and T. Francillon, Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers, ACM SIGSAC Conf. on Computer and Communications Security, pp.163-177, 2018.

A. Chaman, J. Wang, J. Sun, H. Hassanieh, and R. R. Choudhury, Ghostbuster: Detecting the Presence of Hidden Eavesdroppers, 24th Int. Conf. on Mobile Computing and Networking (MobiCom), 2018.

L. Huang, X. Wu, C. Zhao, and M. Gao, Identification of radio transmitters fingerprint based on curve fitting, IEEE Int. Conf. on Signal Processing, Communication and Computing (ICSPCC), 2013.

D. Lee, W. La, and H. Kim, Drone Detection and Identification System using Artificial Intelligence, Int. Conf. on Information and Communication Technology Convergence (ICTC), 2018.

H. Li, G. Johnson, M. Jennings, and Y. Dong, Drone profiling through wireless fingerprinting, IEEE 7th Int. Conf. on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), pp.858-863, 2017.

P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han et al., Matthan: Drone presence detection by identifying physical signatures in the drone's RF communication, 15th Int. Conf. on Mobile Systems, Applications, and Services, 2017.

P. Nguyen, M. Ravindranatha, A. Nguyen, R. Han, and T. Vu, Investigating cost-effective rf-based detection of drones, 2nd Work. on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, pp.17-22, 2016.

K. B. Rasmussen and S. Capkun, Implications of radio fingerprinting on the security of sensor networks, Int. Conf. on Security and Privacy in Communications Networks and the Workshops-SecureComm, 2007.

T. D. Vo-huu, T. D. Vo-huu, and G. Noubir, Fingerprinting Wi-Fi devices using software defined radios, 9th ACM Conf. on Security & Privacy in Wireless and Mobile Networks, pp.3-14, 2016.

K. Wang, S. Chen, and A. Pan, Time and position spoofing with open source projects, vol.148, 2015.

C. Zhao, C. Chen, and Z. He, Z.and Wu. Applied Sciences, issue.12

H. Bouafif, F. Kamoun, F. Iqbal, and A. Marrington, Drone Forensics: Challenges and New Insights, 9th IFIP Int. Conf. on New Technologies, Mobility and Security (NTMS), 2018.

G. Horsman, Unmanned aerial vehicles: A preliminary analysis of forensic challenges, Digital Investigation, vol.16, pp.1-11, 2016.

U. Jain, M. Rogers, and E. T. Matson, Drone forensic framework: Sensor and data identification and verification, IEEE Sensors Applications Symposium (SAS), pp.1-6, 2017.

J. Mead, C. Bobda, and T. Whitaker, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)

T. Reed, J. Geis, and S. Dietrich, Skynet: A 3g-enabled mobile attack drone and stealth botmaster, USENIX. Work. on Offensive Technologies, pp.28-36, 2011.

R. Akeela and B. Dezfouli, Software-defined Radios: Architecture, State-of-the-art, and Challenges, 2018.

F. L. Roy, T. Quiniou, A. Mansour, R. Lababidi, and D. Le-jeune, RFID Eavesdropping Using SDR Platforms, Applications in Electronics Pervading Industry, pp.208-214, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01404508

A. Broumandan, R. Siddakatte, and G. Lachapelle, An approach to detect GNSS spoofing, IEEE Aerospace and Electronic Systems Mag, vol.32, issue.8, pp.64-75, 2017.

A. Torabi, M. W. Shafer, G. S. Vega, and K. M. Rothfus, UAV-RT: an SDR based aerial platform for wildlife tracking, 88th IEEE Vehicular Technology Conf., VTC , Chicago, 2018.

A. Moawad, K. Yao, A. Mansour, and R. Gautier, 15th Int. Sympo. on Wireless Communication Systems, 2018.

J. Gaspar, R. Ferreira, P. Sebastião, and N. Souto, Capture of uavs through gps spoofing, Global Wireless Summit (GWS), 2018.