1. R. Sharman and S. Sharma, Comput. Technol. Appl. 2, 456–462 (2011).
2. P. Michiardi and R. Molva, “Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks,” in Proceedings of the European Wireless Conference (IEEE, Florence, Italy, 2002), pp. 1–6.
3. R. Soua and P. Minet, “A survey on energy-efficient techniques in wireless sensor networks,” in WNNC 2011 - 4th Joint IFIP Wireless and Mobile Networking Conference (IEEE, Toulouse, France, 2011), pp. 1–9.
4. S. Mahfoudh and P. Minet, “An energy-efficient routing based on OLSR in wireless ad hoc and sensor networks,” in Proceedings of PAEWN08 (IEEE, Okinawa, Japan, 2008), pp. 1–6.
5. G. Pei, M. Gerla, and T.-W. Chen, “Fisheye state routing: A routing scheme for ad hoc wireless networks,” in Proceedings of IEEE ICC00 (IEEE, New Orleans, LA, 2000), pp. 1–5.