1. Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen X, Du D-Z (eds) Wireless/mobile network security. Springer, New York, pp 103–135
2. Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional conference
3. Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc networks routing protocol. In: Proceedings of ACM WiSe2003
4. Hu Y, Perrig A, Johnson D (2002) Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceeding of IEEE INFORCOM
5. Douceur JR (2002) The Sybil attack. IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. Springer Verlag, London, UK, pp 251–260