1. Gulia, P., & Sihag, S. (2013). Review and analysis of the security issues in MANET. International Journal of Computer Applications, 75(8), 23.
2. Rukhin, A., Soto, J., Nechvatal, J., Barker, E., Leigh, S., Levenson, M. & Iii, L. E. B. (2002). A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication pp. 800–822.
3. Joshi, S. S., & Biradar, S. R. (2016). Communication framework for jointly addressing issues of routing overhead and energy drainage in MANET. Procedia Computer Science, 89, 57–63.
4. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. F. Korth (Eds.), Mobile computing (pp. 153–181). Springer.
5. Salem, A. O. A., Samara, G., &Alhmiedat, T. (2014). Performance analysis of dynamic source routing protocol. Journal of Emerging Trends in Computing and Information Sciences 5(2).