1. Djenouri, D., Khelladi, L., & Badache, N. (2005). A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys and Tutorials,7(4), 2–28.
2. Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal of Communications and Network,3(3), 60–66.
3. Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks,1(1), 13–64.
4. Douceur, J. R. (2002). The Sybil attack. In P. Druschel, F. Kaashoek, A. Rowstron (Eds.), International workshop on peer-to-peer systems (pp. 251–260). Springer.
5. Joshi, N., & Challa, M (2014). Secure authentication protocol to detect Sybil attacks in MANETs. International Journal of Computer Science & Engineering Technology (IJCSET), 5, 2229–3345.