1. Raoof, A., Matrawy, A., & Lung, C. H. (2019). Routing attacks and mitigation methods for RPL-based Internet of Things,IEEE Commun. Surveys Tuts.,vol. 21, no. 2, pp. 1582–1606, 2nd Quart.
2. Design of a security-aware routing scheme in mobile adhoc network using repeated game model;Balaji S;Comput Standards Interface,2019
3. Schweitzer, N., Stulman, A., Margalit, R. D., & Shabtai, A. (2017). Contradiction based gray-hole attack minimization for ad-hoc networks, IEEE Trans.Mobile Comput., vol. 16, no. 8, pp. 2174–2183, Aug.
4. Defending against new-flow attack in SDN-based Internet of Things;Xu T;Ieee Access : Practical Innovations, Open Solutions,2017
5. Lomotey, R. K., Pry, J., & Sriramoju, S. (2017). Wearable IoT data stream traceability in a distributed health information system,Pervas. Mobile Comput., vol. 40, pp. 692–707, Sep.