A. Rachedi, A. Benslimane, L. Guang, and C. Assi, A Confident Community to Secure Mobile Ad Hoc Networks, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.212

URL : https://hal.archives-ouvertes.fr/hal-00680887

L. Guang, C. Assi, and A. , Benslimane On MAC Layer Misbehavior in Wireless Networks: Challenges and Solutions, IEEE Wireless Communication Magazine, 2007.

S. Ray and D. , Starobinski On False Blocking in RTS/CTS-Based Multihop Wireless Networks Vehicular Technology, IEEE Transactions, vol.56, pp.849-862, 2007.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misebehavior in Mobile Ad Hoc Networks, Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.255-265, 2000.

Y. Zhang and W. Lee, Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.275-283, 2000.
DOI : 10.1145/345910.345958

A. Rahman and P. Gburzynski, Hidden Problems with the Hidden Node Problem, 23rd Biennial Symposium on Communications, 2006, pp.270-273, 2006.
DOI : 10.1109/BSC.2006.1644620

U. Berkeley and U. Isi, The network simulator ns-2, Part of the VINT project Available from http, 1998.