1. Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6, 32–46.
2. Lima, M. N., dos Santos, A. L., & Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 11(1), 66–77.
3. Ebinger, P., & Parsons, M. (2009). Measuring the impact of attacks on the performance of mobile ad hoc networks. In Proceedings of the 6th ACM symposium on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Tenerife, Canary Islands, Spain (pp. 163–164).
4. Liu, X. J. H., Wan, P., & Liu, X. (2007). A distributed and efficient flooding scheme using 1-hop information in mobile adhoc networks. IET Journals & Magazines, 18, 658–671.
5. Maurya, P. K., Sharma, G., Sahu, V., Roberts, A., Srivastava, M., Scholar, M., et al. (2012). An overview of AODV routing protocol. International Journal of Modern Engineering Research (IJMER), 2, 728–732.