1. Akyildiz I. F. Wang X. Wireless Mesh Networks 2009 vol 1. John Wiley & Sons Inc UK. Akyildiz I. F. Wang X. Wireless Mesh Networks 2009 vol 1. John Wiley & Sons Inc UK.
2. Xing K. Srinivasan S. S. R. Rivera M. Li J. Cheng X. Z. 2005. "Attacks and Countermeasures in Sensor Networks: A Survey". Springer Network Security 534--548. Xing K. Srinivasan S. S. R. Rivera M. Li J. Cheng X. Z. 2005. " Attacks and Countermeasures in Sensor Networks: A Survey ". Springer Network Security 534--548.
3. Sen J. 2011. Secure Routing in Wireless Mesh Networks. Wireless Mesh Networks N. Funabiki (Ed.) 237--280. DOI= http://arxiv.org/ftp/arxiv/papers/1102/1102.1226.pdf Sen J. 2011. Secure Routing in Wireless Mesh Networks. Wireless Mesh Networks N. Funabiki (Ed.) 237--280. DOI= http://arxiv.org/ftp/arxiv/papers/1102/1102.1226.pdf
4. Rupinder K. Parminder S. 2014. Black Hole and Greyhole Attack in Wireless Mesh Network. American Journal of Engineering Research 41--47. DOI= http://www.ajer.org/papers/v3(10)/F031041047.pdf Rupinder K. Parminder S. 2014. Black Hole and Greyhole Attack in Wireless Mesh Network. American Journal of Engineering Research 41--47. DOI= http://www.ajer.org/papers/v3(10)/F031041047.pdf
5. Chaudhry J. A. Tariq U. Amin M. A. Rittenhouse R. G. 2013. Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters 7--12. DOI= http://onlinepresent.org/proceedings/vol29_2013/2.pdf Chaudhry J. A. Tariq U. Amin M. A. Rittenhouse R. G. 2013. Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters 7--12. DOI= http://onlinepresent.org/proceedings/vol29_2013/2.pdf