1. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.
2. Wang, D., Hu, M., & Zhi, H. (2008). A survey of secure routing in ad hoc networks. In Web-age information management (pp. 482–486).
3. IEEE 802.11 Standard for wireless LAN. (1999). Medium access control (MAC) and physical layer (PHY) specification. IEEE Inc.
4. Cagalj, M., Ganeriwal, S., Aad, I., & Hubaux, J. P. (2004). On cheating in CSMA/CA ad hoc networks. EPFL, Tech. rep., 1–16.
5. Kyasanur, P., & Vaidya, N. (2003). Detection and handling of MAC layer misbehavior in wireless networks. In International conference on dependable systems and networks (pp. 173–182).