1. Jain, S. (2014). Security threats in MANETS: A review. arXiv preprint arXiv:1405.5320 .
2. Sharma, M., & Dubey, S. K. (2014). Analytical study of cluster based routing protocols in MANET.
3. Aarti, D. S. (2013). Tyagi, “Study Of Manet: Characteristics, challenges, application and security attacks”. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 252–257.
4. Roy, D. B., & Chaki, R., (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. In 2013 annual IEEE India conference (INDICON), (Vol 13–15, pp. 1–6).
5. Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E., (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), (Vol 16–18, pp. 589–596).