1. Regan R, Martin leomanickam J (2016) A survey on wireless mesh networks and its security issues. Int J Sec Appl 10(3):405–418
2. Regan R, Martin leomanickam J (2017) Detecting and denying malicious behavior using adaptive learning based routing protocol in wireless mesh network. Appl Math InfSci 11(4):1155–1162
3. Khalil I, Bagchi S (2011) Stealthy attacks in wireless Ad Hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112
4. Mueller S, Tsang RP, Ghosal D (2004) Multipath routing in mobile ad hoc networks: Issues and challenges. Performance tools and applications to networked systems. Springer, Berlin, pp 209–234
5. Oppliger R, Internet and Intranet Security, Artech House, 1998, Hu Y, Johnson D, Perrig A (2002) SEAD: secure efficient distance vector routing in mobile wireless Ad-Hoc networks. In: Proceedings of the 4 IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02), pp 3–13