Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant
J. Newsome, E. Shi, D. Song, and A. Perrig. Information Processing in Sensor Networks, 2004. IPSN 2004. Third
International Symposium on, page 259--268. (2004)
P. R, K. M, M. H, K. Venugopal, and L. Patnaik. International Journal of Innovative Science and Modern Engineering (IJISME), 3 (2):
67-74(January 2015)
S. Capkun, J. Hubaux, and L. Buttyán. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing, page 46--56. New York, NY, USA, ACM, (2003)