References
[1]. Ahmed, T., Chaudhary, M., Kaleem, M., &Nazir, S.
(2016, December). Optimized depth-based routing
protocol for underwater wireless sensor networks. In 2016,
International Conference on Open Source Systems &
Technologies (ICOSST), (pp. 147-150). IEEE. https://doi.org/10.1109/ICOSST.2016.7838592
[2]. Datatracker. (n.d.). Mobile Ad-Hoc Networks
(MANET). Retrieved from https://datatracker.ietf.org/wg/manet/about/
[3]. Frodigh, M., Johansson, P., & Larsson, P. (2000).
Wireless ad hoc networking: the art of networking without a
network. Ericsson Review, 4(4), 248-263.
[4]. Javaid, N., Ejaz, M., Abdul, W., Alamri, A., Almogren,
A., Niaz, I. A., & Guizani, N. (2017). Cooperative position
aware mobility pattern of AUVs for avoiding void zones in
underwater WSNs. Sensors, 17(3), 580. https://doi.org/10.3390/s17030580
[5]. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source
routing in ad hoc wireless networks. In Mobile Computing,
(pp. 153-181). https://doi.org/10.1007/978-0-585-29603-6_5
[6]. Lee, J. S. (2008). A Petri net design of command filters
for semiautonomous mobile sensor networks. IEEE
Transactions on Industrial Electronics, 55(4), 1835-1841.
https://doi.org/10.1109/TIE.2007.911926
[7]. Liu, K., Deng, J., Varshney, P. K., &Balakrishnan, K.
(2007). An acknowledgment-based approach for the
detection of routing misbehavior in MANETs. IEEE
Transactions on Mobile Computing, 6(5), 536-550. https://doi.org/10.1109/TMC.2007.1036
[8]. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August).
Mitigating routing misbehavior in mobile ad hoc networks.
In Proceedings of the 6th Annual International Conference
on Mobile Computing and Networking, (pp. 255-265).
https://doi.org/10.1145/345910.345955
[9]. Patcha, A., & Mishra, A. (2003, August). Collaborative
security architecture for black hole attack prevention in
mobile ad hoc networks. In Radio and Wireless
Conference, 2003. RAWCON'03. Proceedings, (pp. 75-78). IEEE. https://doi.org/10.1109/RAWCON.2003.1227896
[10]. Royer, E. M., & Toh, C. K. (1999). A review of current
routing protocols for ad hoc mobile wireless networks. IEEE
Personal Communications, 6(2), 46-55. https://doi.org/10.1109/98.760423
[11]. Shakshuki, E. M., Kang, N., &Sheltami, T. R. (2013).
EAACK-a secure intrusion-detection system for MANETs.
IEEE Transactions on Industrial Electronics, 60(3), 1089-1098. https://doi.org/10.1109/TIE.2012.2196010
[12]. Sun, B. (2003). Intrusion Detection in Mobile Ad Hoc
Networks. (Doctoral dissertation, Texas A&M University.
Texas A&M University).