[1] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, 6-11 August, 2000.
[2] H. Yang, J. Shu, X. Meng and S. Lu, “SCAN: Self-organized network-layer security in Mobile ad hoc networks,” IEEE Journals on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
[3] 3. Scalable Networks Technologies: QualNet simulator 4.5, http://www.scalable-networks.com/
[4] IEEE 802.11g. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, August, 1999.
[5] M. A. Azer, S. M. El-Kassas, and M. S. El-Soudani, “Certification and revocation schemes in ad hoc networks survey and challenges,” Proceeding of IEEE International Conference on Systems and Networks Communications, 2007.
[6] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET,” Proceeding of International Conference on Network Protocols, pp. 251–260, 2001.
[7] N. Nasser and Y. Chen, “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks,” Proceeding of International Conference on Communications, pp. 1154–1159, 2007.