[1]
S. B. Kolla and B. Prasad, “A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks”, Int. J. Comp. Sci. Eng., vol. 2, no. 4, pp. 20–25, Apr. 2014.