1. Biswas, K., Ali, M.L.: Security threats in mobile ad hoc network. M.Sc. Thesis, BTH, Sweden (2007)
2. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
3. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. Proceedings of MobiCom 2000, 6th Annual International Conference on Mobile Computing and Networking, Boston, USA, 6–11 Aug 2000
4. Pietro, R.D., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, pp. 66–73, Oct 2002
5. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.: On communication security in wireless ad-hoc sensor networks. In: Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02), pp. 139–144, June 2002