Aivaloglou, E., Gritzalis, S., & Skianis, Ch. (2007). Towards a flexible trust establishment framework for sensor networks. Telecommunications Systems, 35(3–4), 207–213.
Balakrishnan, V., Varadharajan, V., & Tupakula, U. (2010). Trust management in mobile ad hoc networks. In S. Misra (Ed.), Guide to wireless ad hoc and sensor networks (pp. 473–502). London: Springer.
Balfe, S., Yau, P., & Peterson, K. G. (2010). A guide to trust in mobile ad hoc networks. Security and Communication Networks, 3(6), 503–516.
Buchegger, S., Mundinger, J., & Le Boudee, J. Y. (2008). Reputation systems for self-organized networks. IEEE Technology & Society Magazine, 27(1), 41–47.
Buchegger, S., Tissieres, C., & Le Boudee, J. Y. (2004). A test-bed for misbehavior detection in mobile ad-hoc networks. In Proceedings of the IEEE workshop on mobile computing systems and applications WMCSA (pp. 102–111).
Chakeres, I. D., & Perkins, C. E. (2006). Dynamic MANET On-demand (DYMO) routing. http://tools.ietf.org/html/draft-ietf-manet-aodvv2-02 (July 2013)
Choudhury, S., & Gibson, J. D. (2006). Joint PHY/MAC based link adaptation for wireless LANs with multipath fading. In Proceedings of IEEE wireless communications and networking conference (Vol. 2, pp. 757–762).
Dehnie, S., & Tomasin, S. (2010). Detection of selfish nodes in networks using CoopMAC protocol with ARQ. IEEE Transactions on Wireless Communications, 9(7), 2328–2337.
He, Q., Wu, D., & Khosla, P. (2006). A secure incentive architecture for ad hoc networks. Wireless Communications and Mobile Computing, 6(3), 333–346.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536–550.
Maeda, K., Uchiyama, A., Umedu, T., Yamaguchi, H., & Higashino, T. (2009). Urban pedestrian mobility for mobile wireless network simulation. Ad Hoc Networks, 7(1), 153–170.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad-hoc networks. In Proceedings of the ACM international conference on mobile computing and networking MobiCOM (pp. 255–265).
Michiardi, P., & Molva, R. (2005). Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks, 3(2), 193–219.
Nadeem, A., & Howarth, M. (2011). Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems, 1–12.
Rice Monarch Project (2010). Wireless and mobility extensions to ns-2. http://www.monarch.cs.rice.edu/cmu-ns.html.
Rodriguez-Mayol, A., & Gozalvez, J. (2010). On the implementation feasibility of reputation techniques for cooperative mobile ad-hoc networks. In Proceedings of the European wireless conference (pp. 616–623).
Sundararajan, T. V. P., & Shanmugam, A. (2010). Modeling the behavior of selfish forwarding nodes to stimulate cooperation in MANET. International Journal of Network Security & Its Applications (IJNSA), 2(2), 147–160.
Thong, T., & Buttyán, L. (2011). On automating the verification of secure ad-hoc network routing protocols. Telecommunication Systems, 1–25.
UMTS 30.03 v3.2.0 TR 101 112. Selection procedures for the choice of radio transmission technologies of the UMTS. ETSI, 1998.
WINNER (2010). DI. 1.1. WINNER II Interim channel models. Public deliverable, http://www.ist-winner.org/.
Yoo, Y., & Agrawal, D. P. (2006). Why does it pay to be selfish in a MANET? IEEE Wireless Communications Magazine, 13(6), 87–97.
Yu, W., & Liu, K. J. R. (2007). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(5), 507–521.