1.
Alex Varshavsky, Bradley Reid, Eyal de Lara walex,brad A Cross-Layer Approach to Service Discovery and Selection in MANETs, Department of Computer Science University of Toronto 2005 IEEE.
2.
P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proceedings of the 7th International Symposium on Communication Theory and Applications, 2003, pp. 99–104
3.
A. Nadeem and M. P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks," in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, Fourth Quarter 2013, doi: 10.1109/SURV.2013.030713.00201.
4.
M. Pirrete and R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence”, International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.
5.
S. Kurosawa and A. Jamalipour, “Detecting Blackhole Attack on AODVbased Mobile Ad Hoc Networks by Dynamic Learning method”, International Journal of Network Security, Vol.5, No.3, pp 338-345, November2007.
6.
J.Sen, M.Chandra, S.G. Harihara, H.Reddy and P.Balamuralidhar, “A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks”, Proc. IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore, Dec. 2007
7.
L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, NSW, Australia, 2007, pp. 21-21, doi: 10.1109/AUSWIRELESS.2007.61.
8.
Payal N. Raj and Prashant B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET “,International Journal of Computer Science Issues, Vol. 2, 2009,PP 54-59
9.
V. Mohite and L. Ragha, "Cooperative Security Agents for MANET," 2012 World Congress on Information and Communication Technologies, Trivandrum, 2012, pp. 549-554, doi: 10.1109/WICT.2012.6409138.
10.
K. S. Chavda and A. V. Nimavat, "Removal of black hole attack in AODV routing protocol of MANET," 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 2013, pp. 1-5, doi: 10.1109/ICCCNT.2013.6726832.
11.
T. Varshney, T. Sharma and P. Sharma, "Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network," 2014 Fourth International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 217-221, doi: 10.1109/CSNT.2014.50.
12.
T. Shu and M. Krunz, "Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks," in IEEE Transactions on Mobile Computing, vol. 14, no. 4, pp. 813-828, 1 April 2015, doi: 10.1109/TMC.2014.2330818.
13.
Vimal Kumar, Rakesh Kumar, An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network, Procedia Computer Science, Volume 48, 2015, Pages 472-479,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2015.04.122.
14.
S. Jain and A. Khuteta, "Detecting and overcoming blackhole attack in mobile Adhoc Network," 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, 2015, pp. 225-229, doi: 10.1109/ICGCIoT.2015.7380462.
15.
Adwan Yasin, Mahmoud Abu Zant, "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique", Wireless Communications and Mobile Computing, vol. 2018, Article ID 9812135, 10 pages, 2018. https://doi.org/10.1155/2018/9812135
16.
Musale S.S., Dhende S.L., Shirbahadurkar S.D., Najan A.S. (2019) Gray Hole and Cooperative Attack Prevention Protocol for MANETs. In: Abraham A., Dutta P., Mandal J., Bhattacharya A., Dutta S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-13-1501-5_49
17.
Ali H. Ahmed, Nagwa M. Omar, and Hosny M. Ibrahim, "Secured Service Discovery Technique in IoT," Journal of Communications, vol. 14, no. 1, pp. 40-46, 2019. Doi: 10.12720/jcm.14.1.40-46.
18.
Mahmoud Abu Zant, Adwan Yasin, "Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)", Security and Communication Networks, vol. 2019, Article ID 8249108, 12 pages, 2019. https://doi.org/10.1155/2019/8249108.
19.
Hwanseok Yang, "A Study on Improving Secure Routing Performance Using Trust Model in MANET", Mobile Information Systems, vol. 2020, Article ID 8819587, 17 pages, 2020. https:// doi.org/10.1155/2020/8819587.
20.
Tripathy, B.K., Jena, S.K., Bera, P. et al. An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks. Wireless Pers Commun 114, 1339–1370 (2020). https://doi.org/10.1007/s11277-020-07423-x
21.
Ran, C., Yan, S., Huang, L. et al. An improved AODV routing security algorithm based on blockchain technology in ad hoc network. J Wireless Com Network 2021, 52 (2021). https://doi.org/10.1186/s13638-021-01938-y
22.
A. M. El-Semary and H. Diab, "BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map," in IEEE Access, vol. 7, pp. 95197-95211, 2019, doi: 10.1109/ACCESS.2019.2928804.
23.
Y. Fu, G. Li, A. Mohammed, Z. Yan, J. Cao and H. Li, "A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks," 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2019, pp. 1431-1436, doi: 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259.
24.
Muruganantham Ponnusamy, Dr. A. Senthilkumar, and Dr.R.Manikandan, “Detection of Selfish Nodes Through Reputation Model In Mobile Adhoc Network MANET’ Turkish Journal of Computer and Mathematics Education, Vol.12 No.9 (2021), 2404– 2410.
25.
Alaa Althalji, Souheil Khawatmi, Mohamed Khatib Improving the Security of AODV Protocol using V-Detector Algorithm, International Journal of Computer Applications (0975 – 8887) Volume 177 – No. 17, November 2019
26.
Ankit Kumar & Madhavi Sinha (2019) Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET), Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: 10.1080/09720529.2019.1637151
27.
Md Ibrahim Talukdar, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, Amjed Sid Ahmed, "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature", Wireless Communications and Mobile Computing, vol. 2021, 13 pages, 2021. https://doi.org/10.1155/2021/6693316.
28.
N. Islam and Z. A. Shaikh, "A Novel Approach to Service Discovery in Mobile Adhoc Network," 2008 IEEE International Networking and Communications Conference, 2008, pp. 58-62, doi: 10.1109/INCC.2008.4562692.
29.
Smitha Kurian, Loganathan R,International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019
30.
Kurian, S., Ramasamy, L. Novel AODV based service discovery protocol for MANETS. Wireless Netw 27, 2497–2508 (2021). https://doi.org/10.1007/s11276-021-02596-0.
31.
https://tools.ietf.org/html/rfc3561 accessed last on August 2021.