Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3187-y.
Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications. https://doi.org/10.1007/s11036-011-0328-0.
Jhaveri, R. H., Patel, S. J. & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey, In IEEE 2nd International Conference on Advanced Computing & Communication Technologies.
Singh, T., Singh, J., & Sharma, S. (2016). Energy efficient secured routing protocol for MANETs. Wireless Network. https://doi.org/10.1007/s11276-015-1176-9.
Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3318-5.
Gurung, S., & Chauhan, S. (2017). A dynamic based approach for mitigating black-hole attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-017-1514-1.
Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2015). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Network. https://doi.org/10.1007/s11276-015-1032-y.
Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE International Conference on WiSPNET (pp. 2409–2415).
Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. In IEEE International Workshop on Selected Topics in Mobile and Wireless Computing (pp. 699–706).
Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE 9th Malaysia International Conference (pp. 530–535). https://doi.org/10.1109/MICC.2009.5431439.
Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications,
Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (pp. 338–343).
Vadhana, S. K. & Paramasivan, B. (2015). Ant based defense mechanism for selective forwarding attack in MANET. In IEEE ICDE Workshops (pp. 92–97).
Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012). Two-level secure re-routing (TSR) in mobile ad hoc networks. In International Conference on Advances in Mobile Network, Communication and Its Applications (pp. 119–122).
Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of IEEE Conference on Information and Communication Technologies (pp. 479–484).
Gurung, S., & Chauhan, S. (2016). A novel approach for mitigating grayhole attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-016-1353-5.
Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal,
Gurung, S, Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In Proceedings of 5th, ACEEE International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (pp. 229–237).
The Network Simulator-NS-2.35 (2016). http://www.isi.edu/nsnam/ns/.
Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating flooding attack in MANET. Wireless Network. https://doi.org/10.1007/s11276-017-1515-0.