1. Xing, F., Wang, W.: On the survivability of wireless ad hoc networks with node misbehaviors and failures. In: IEEE Trans. Dependable Secur. Comput. 7(3), 284–299 (2010)
2. Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660–674 (2015)
3. Beaubrun, R., Molo, B.: Performance evaluation of DSR in multi-services ad hoc networks. In: Park, J.H., Chen, H.H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.S. (eds.) Advances in Information Security and Assurance, ISA 2009. Lecture Notes in Computer Science, vol. 5576. Springer, Berlin (2009)
4. Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: 2016 International Conference on Electrical and Information Technologies (ICEIT), Tangiers, pp. 536–542 (2016)
5. Qiana, L., Songa, N., Li, X.: Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach. J. Netw. Comput. Appl. (2005)