... Buttyan, and S. Capkun, “The quest for security in mobile ad hoc networks, ” in Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA,October 2001.[17] ... Malt, Mobile Computing. Kluwer AcademicPublishers, 1996, ch. Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, (Tomasz Imielinski and Hank Korth, eds.).[Online]. Available: http://www.monarch.cs.cmu.edu/monarch-papers/kluwer-adhoc.ps[29] ... http://www.monarch.cs.cmu.edu/monarch-papers/kluwer-adhoc.ps[29] B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A securerouting protocol for ad hoc networks, ” UMass, Tech. Rep., 2001.[Online]. Available: ftp://ftp.cs.umass.edu/pub/techrept/techreport/2001/UM-CS-2001-037.ps[30]...