[1] “IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999),” June 12, 2007.
[2] 惠汝生(2006)。無線Ad hoc行動隨意網路架構之技術發展評析。IECQ 報導第四十九期,中華民國電子零件認證委員會。Available:http://www.cteccb.org.tw/pdf/IECQ-49-6.pdf
[3] Internet Engineering Task Force, Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), Available: http://www.rfc-editor.org/rfc/rfc3561.txt
[4] Mahesh K. Marina and Samir R. Das, “Ad Hoc on-Demand Multipath Distance Vector Routing,” Wireless Communications and Mobile Computing, vol.6, no.7, pp. 969-988, nov. 2006
[5] 賴國楨(2011)。行動隨意網路中區域獨立多重路徑路由協定之改善。大同大學通訊工程研究所碩士論文,台北。[6] Rupinder Kaur, Parminder Singh, “Review of Black Hole and Gray Hole Attack,” The International Journal of Multimedia & Its Applications ,IJMA, vol.6, no.6, pp. 35-45,Dec. 2014
[7] B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, vol. 17, 2006.
[8] L. Perrone and S. Nelson, “A study of on-off attack models for wireless ad hoc networks”, in proc. First IEEE International Workshop on Operator-Assisted Community Networks, OpComm’06, Berlin, German, 18-19 Sep. 2006, pp. 1-10
[9] Younghun Chae and DiPippo, L.C. and Sun, Y.L., "Trust Management for Defending On-Off Attacks", IEEE Transactions on Parallel and Distributed Systems, vol.26, no.4, pp.1178-1191, Apr. 2015
[10] X. Mao and J. McNair, "Effect of on/off misbehavior on overhearing based cooperation scheme for MANET", Proc. Military Commun. Conf., pp. 1086-1091, 2010
[11] Farid Bin Beshr, Ahmed Bin Ishaq, Saeed Aljabri, Tarek R. Sheltami, “A Guard Node (GN) based Technique against Misbehaving Nodes in MANET,” Journal of Ubiquitous Systems & Pervasive Networks, vol.7, no.1, pp.13-17, 2016
[12] Kushwaha, U.S., P. K. Gupta, “AOMDV routing algorithm for Wireless Mesh Networks with local repair (AOMDV-LR)”, in Proc. International Conference on Communications and Signal Processing ,ICCSP, Melmaruvathur, India, 3-5 April. 2014, pp. 818-822
[13] Sayaka Umeda and Sonoko Takeda and Hiroshi Shigeno, ” Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks ”, in proc. International Conference on Mobile Computing and Ubiquitous Networking .ICMU‘15, Hakodate, Japan, 20-22 Jan. 2015, pp.143-148
[14] Juan A. Martinez, Daniel Vigueras, Francisco J. Ros, and Pedro M. Ruiz, “Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs”, Journal of Communication and Networks, vol.15, no.2, pp.122-131, April 2013
[15] Rahul Talreja and Vimla Jethani, ”A Vote Based System to Detect Misbehaving Nodes in MANETs”, in proc. IEEE International Advance Computing Conference.IACC’14, Gurgaon, India, 21-22 Feb.2014, pp. 391-394
[16] Alfarez Abdul-Rahman and Stephen Hailes, "A distributed trust model", in proc. New Security Paradigms Workshop.NSPW'97, Langdale, Cumbria, United Kingdom, 23-26 Sep. 1997, pp.48-60
[17] Amit Chauhan and Arti Patle and Anita Mahajan, ” A Better Approach towards Securing Mobile Adhoc Network”, International Journal of Computer Applications, vol.20, no.8, pp.6-11, Apr. 2011
[18] Kshirsagar, R.V, “Multipath Reliable Range Node Selection Distance Vector Routing for VANET: Design Approach”, in Proc. International Conference on Electronic Systems, Signal Processing and Computing Technologies, ICESC, Nagpur, India, 9-11 Jan. 2014, pp. 280 – 283
[19] Ehsan Mostajeran, Rafidah Md Noor, Hassan Keshavarz, “A novel improved neighbor discovery method for an Intelligent-AODV in Mobile Ad hoc Networks,” in Proc. 2013 International Conference of Information and Communication Technology, ICoICT, Bandung, Indonesian, 20-22 Mar. 2013, pp. 395 – 399
[20] Game wiki, The Resistance: Avalon, Available:http://web.eecs.umich.edu/~gameprof/gamewiki/index.php/The_Resistance:_Avalon
[21] The Network Simulator - ns-2, Available: http://www.isi.edu/nsnam/ns/
[22] Francisco J. Ros and Pedro M. Rui, “Implementing a New MANET Unicast Routing Protocol in NS2,”Dec. 2004.
[23] NS2.26SourcesOriginal Class Hierarchy, Available: http://www.netlab.ecnu.edu.cn/software/ns-class/namespaces.htm
[24] ns-2 Tutorial, Available: http://www.isi.edu/nsnam/ns/tutorial/nsindex.html
[25] 程榮祥、柯志亨、鄧德雋、丁建文(2009)。NS2網路模擬實驗。台北市:學貫行銷