1. Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H.N., and Bhattacharjee, D., Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques, arXiv, 2011. https://arxiv.org/ pdf/1111.4090.pdf. Accessed May 23, 2017.
2. Karlf, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127.
3. Wu, B., Chen, J., Wu, J., and Cardei, M., A survey on attacks and countermeasures in mobile ad hoc networks, Wireless Network Secur., 2007, pp. 103–135.
4. Coltun, R., Ferguson, D., Moy, J., and Lindem, A., RFC 5340. OSPF for IPv6, IETF Tools, 2008. https://tools.ietf.org/html/rfc5340. Accessed May 23, 2017.
5. Ogier, R. and Spagnolo, P., RFC 5614. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding, IETF Tools, 2009. https://tools.ietf.org/html/rfc5614. Accessed May 23, 2017.