H. Secure and . Standard, Federal Information Processing Standard, pp.180-182, 2002.

C. N. , -. Awerbuch, D. Holmer, and H. Rubens, An On-Demand Secure Routing Protocol Resilient to Byzantine Failures, ACM Workshop on Wireless Security (WiSe), 2002.

S. Buchegger and J. L. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002.
DOI : 10.1109/EMPDP.2002.994321

J. Cordasco and S. Wetzel, An attacker model for MANET routing security, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.87-93, 2009.
DOI : 10.1145/1514274.1514288

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.
DOI : 10.1007/978-3-662-04722-4

M. Dworkin, Recommendation for Block Cipher Modes of Operation -Methods and Techniques, NIST Special Publication, pp.800-838, 2001.

M. Dworkin, Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, NIST Special Publication, pp.800-838, 2004.
DOI : 10.6028/NIST.SP.800-38c

R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis et al., TEP 123: Collection Tree Protocol, 2006.

Y. Hu, D. Johnson, and A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad Hoc Networks, pp.175-192, 2003.
DOI : 10.1016/S1570-8705(03)00019-2

Y. Hu, A. Perrig, and D. B. Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.12-23, 2002.
DOI : 10.1145/570645.570648

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, 1996.
DOI : 10.1007/978-0-585-29603-6_5

P. Levis, N. Patel, S. Shenker, and D. Culler, Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI), pp.15-28, 2004.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

K. Meka, M. Virendra, and S. Upadhyaya, Trust Based Routing Decisions in Mobile Ad-hoc Networks, Proceedings of the Workshop on Secure Knowledge Management, 2006.

P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.

C. Perkins, E. Belding-royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, 2003.
DOI : 10.17487/rfc3561

C. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, pp.234-244, 1994.

C. Perkins and E. Royer, Ad-Hoc On-Demand Distance Vector Routing, MIL- COM '97 Panel on Ad Hoc Networks, 1997.

A. Perrig, R. Canetti, D. Tygar, and D. Song, The TESLA Broadcast Authentication Protocol, Cryptobytes, pp.2-13, 2002.

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001.
DOI : 10.1145/381677.381696

R. Rivest, The MD5 Message-Digest Algorithm, 1992.
DOI : 10.17487/rfc1321

B. Schneier and W. Diffie, Applied cryptography: protocols, algorithms, and source code in C, 1996.

M. G. Zapata and N. Asokan, Securing ad hoc routing protocols, Proceedings of the ACM workshop on Wireless security , WiSE '02, pp.1-10, 2002.
DOI : 10.1145/570681.570682