1. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. “Security in mobile ad-hoc networks: Challenges and solution,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38–47, Feb. 2004.
2. M. Meghdadi, S. Özdemir, and Ý. Güler. “Security wireless sensor networks: Problems and solutions,” (manuscript in Turkish), Journal of Informatica Technologies, Gazi University, Ankara, Turkey, vol. 1, no. 1, pp. 35–42, Jan. 2008.
3. F. Hu, D. Dong, and Y. Xiao. “Attacks and countermeasures in multi-hop cognitive radio networks,” International Journal of Security and Networks, vol. 4, no. 4, pp. 263–71, 2009.
4. Najma Farooq, Irwa Zahoor, Sandip Mandal,” Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks” Vol.4, No.3 (June 2014) International Journal of Current Engineering and Technology E-ISSN 2277 – 4106, P-ISSN 2347-5161.
5. V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris. “A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks,” International Journal of Security and Networks, vol. 1, no. 3/4, pp. 255–65, 2006.