[1] Wood, A. and Stankovic, J. (2002) Denial of Service in Sensor Networks. IEEE Computer, 35, 54-62.
http://dx.doi.org/10.1109/MC.2002.1039518
[2] Gurwinder, K. and Rachit, G.M. (2012) Energy Efficient Topologies for Wireless Sensor Networks. International Journal of Distributed and Parallel Systems (IJDPS), 3, 179-192.
[3] Virmani, D. and Jain, S. (2013) Cluserting Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks. International Journal of Computer Science and Issues, 1-12.
[4] Xu, Y., Bien, S., Mori, Y., Heidemann, J. and Estrin, D. (2008) Topology Control Protocols to Conserve Energy in Wireless ad Hoc Networks. CENS Technical Report UCLA, Number 6, Los Angeles, 128-134.
[5] Lee, J.-S. and Chang, C.-C. (2007) Secure Communications for Cluster-Based ad Hoc Networks Using Node Identities. Journal of Network and Computer Applications, 30, 1377-1396.
http://dx.doi.org/10.1016/j.jnca.2006.10.003
[6] Wu, B., Wu, J., Fernandez, E.B., Ilyas, M. and Magliveras, S. (2007) Secure and Efficient Key Management in Mobile ad Hoc Networks. Journal of Network and Computer Applications, 30, 937-954.
http://dx.doi.org/10.1016/j.jnca.2005.07.008
[7] Lv, B., Zhang, X.-F., Wang, C. and Yuan, N.-C. (2008) Study of Channelized Noise Frequency-Spot Jamming Techniques.
[8] Xi, Y.-Y. and Cheng, N.-P. (2011) Performance Analysis of Multi-Tone Frequency Sweeping Jamming for Direct Sequence Spread Spectrum Systems.
[9] Murray, S. (1975) Generic Multi-Directional Barrage Jamming System. US Patent No. 3879732.
[10] Schuerger, J. and Garmatyuk, D. (2008) Deceptive Jamming Modelling in Radar Sensor Networks. Military Communications Conference, San Diego, 16-19 November 2008, 1-7.
[11] Xu, W., Wood, T., Trappe, W. and Zhang, Y.Y. (2004) Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. Proceedings of the 2004 ACM Workshop on Wireless Security, ACM, New York, 80-89.
http://dx.doi.org/10.1145/1023646.1023661
[12] Sari, A. and Necat, B. (2012) Securing Mobile Ad-Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), 3, 79-94.
http://dx.doi.org/10.5121/ijasuc.2012.3306
[13] Law, Y., Hartel, P., den Hartog, J. and Havinga, P. (2005) Link-Layer Jamming Attacks on S-MAC. Proceedings of the Second European Workshop on Wireless Sensor Networks, 31 January-2 February 2005, 217-225.
http://dx.doi.org/10.1109/EWSN.2005.1462013
[14] Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
http://dx.doi.org/10.4236/ijcns.2015.83003
[15] Xu, W.Y., Ma, K., Trappe, W. and Zhang, Y. (2006) Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network, 20, 41-47.
http://dx.doi.org/10.1109/MNET.2006.1637931
[16] Wood, A. and Stankovic, J.A. (2002) Denial of Service in Sensor Networks. Computer, 35, 54-62.
http://dx.doi.org/10.1109/MC.2002.1039518
[17] Balogun, V. and Krings, A. (2014) Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code. IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), Victoria, 13-16 May 2014, 704-711.
[18] Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2009) A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Communications Surveys & Tutorials, 11, 42-56.
http://dx.doi.org/10.1109/SURV.2009.090404
[19] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology (IJSAT), 2, 188-191.
[20] Wilhelm, M., Martinovic, I., Schmitt, J.B. and Lenders, V. (2011) Short Paper: Reactive Jamming in Wireless Networks—How Realistic Is the Threat? Proceedings of the Fourth ACM Conference on Wireless Network Security, ACM, New York, 47-52.
[21] Chen, D., Deng, J. and Varshney, P.K. (2003) Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. MOBICOM-Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, San Diego, 14-19 September 2003.
[22] Gokhale, V., Ghosh, S. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey. In: Khan Pathan, A., Ed., Security of Self-Organizing Networks, MANET WSN WMN VANET, Auerbach Publications, 195-225.
http://dx.doi.org/10.1201/EBK1439819197-12
[23] Xu, W., Trappe, W., Zhang, Y.Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. MobiHoc ’05: Proceedings of the 6th ACM International Symposium on Mobile ad Hoc Networking and Computing, Urbana-Champaign, 25-28 May 2005, 46-57.
http://dx.doi.org/10.1145/1062689.1062697
[24] Sari, A. (2014) Security Approaches in IEEE 802.11 MANET. International Journal of Communications, Network and System Sciences, 7, 365-372.
http://dx.doi.org/10.4236/ijcns.2014.79038
[25] Ju, K. and Chung, K. (2012) Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi Hop Tactical Networks. International Journal of Security and Its Applications, 6, 149-154.
[26] Mahajan, R. and Nair, S. (2013) Performance Evaluation of Zigbee Protocol Using Opnet Modeler for Mine Safety. International Journal of Computer Science and Network, 2, 62-66.
[27] OPNET Technologies Inc. “Opnet Simulator”.
www.opnet.net