Rushing attacks and defense in wireless ad hoc network routing protocols
Secure verification of location claims