T. Anantvalee and J. Wu, A Survey on Intrusion Detection in Mobile Ad Hoc Networks, Wireless/Mobile Network Security, 2008.
DOI : 10.1007/978-0-387-33112-6_7

S. Axelsson, Intrusion detection systems: A survey and taxonomy, 2000.

S. Banerjee, B. Bhattacharje, and C. Kommareddy, Scalable application layer multicast, In: ACM SIGCOMM, 2002.

T. Clausen and P. Jacquet, Optimized link state routing protocol (olsr), rfc 3626, 2003.

T. Clausen, P. Jacquet, A. Laouti, P. Muhlethaler, A. Quayyum et al., Optimized link state routing protocol, p.IEEE INMIC, 2001.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

A. K. Ganame, R. Bidoud, J. Bourgeois, and F. Pies, A high performance system for intrusion detection and reaction management, Journal of Information Assurance and Security, 2006.

A. K. Ganame, J. Bourgeois, and R. Bidou, A Global Security Architecture for Intrusion Detection on Computer Networks, 2007 IEEE International Parallel and Distributed Processing Symposium, 2007.
DOI : 10.1109/IPDPS.2007.370621

URL : https://hal.archives-ouvertes.fr/hal-00663122

V. Pacheco and R. Puttini, An Administration Structure for the OLSR Protocol, Part III, 2007.
DOI : 10.1007/978-3-540-74477-1_71

P. Albers, O. Camp, and J. M. Percher, Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches, 2002.
URL : https://hal.archives-ouvertes.fr/hal-01178727

F. Sailhan, L. Fallon, and K. Quinn, Wireless Mesh Network Monitoring: Design, Implementation and Experiments, 2007 IEEE Globecom Workshops, 2007.
DOI : 10.1109/GLOCOMW.2007.4437816

F. Sailhan and V. Issarny, Scalable Service Discovery for MANET, Third IEEE International Conference on Pervasive Computing and Communications, 2005.
DOI : 10.1109/PERCOM.2005.36

URL : https://hal.archives-ouvertes.fr/inria-00414946

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, 2008.
DOI : 10.1007/978-0-387-33112-6_5