References
- Y. Hu, A. Perrig, and D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols".
- I. Khalil, S. Bagchi, and N.B. Shroff, "LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks," Proc. Int. Conf. Dependable Syst. Networks, pp.612-621, 2005.
- Y. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks in Wireless Networks," vol.24, no.2, pp. 370-380, 2006. https://doi.org/10.1109/JSAC.2005.861394
- S. Capkun, and J. Hubaux, "SECTOR : Secure Tracking of Node Encounters in Multi-hop Wireless Networks Categories and Subject Descriptors," vol. 67322, pp.5005. 2003.
- W. Wang, and Y. Lu, "Defending against Wormhole Attacks in Mobile Ad Hoc Networks".
- P. Van Tran, L.X. Hung, Y. Lee, S. Lee, and H. Lee, "TTM : An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks," pp.593-598, 2007.
- A.S. Alshamrani, "Workshops of International Conference on Advanced Information Networking and Applications PTT : Packet Travel Time Algorithm in Mobile Ad Hoc Networks," pp.561-568, 2011.
- C.E. Perkins, M. Park, and E.M. Royer, " Ad-hoc On-Demand Distance Vector Routing," 2006.
- M. Khabbazian, H. Mercier, and V.K. Bhargava, "Wormhole Attack in Wireless Ad Hoc Networks : Analysis and Countermeasure".
- L. Qian, N. Song, and X. Li, "Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach", vol.30, pp.308-330, 2007. https://doi.org/10.1016/j.jnca.2005.07.003
- C. Paper, W. Znaidi, and S. Appliqu, "Detecting wormhole attacks in wireless networks using local neighborhood information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information", 2008.
- D. Dong, M. Li, Y. Liu, and S. Member, "Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks," vol.19, no.6, pp.1787-1796, 2011.
- L. F. Garcia, and J. Robert, "Preventing Layer-3 Wormhole Attacks in Ad-hoc Networks with Multipath DSR," pp.15-20, 2009.
- M.Y. Su, "WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks", Comput. Secur. , vol.29, no.2, pp.208-224, 2010. https://doi.org/10.1016/j.cose.2009.09.005
- Y. Yu, L. Guo, X. Wang, and C. Liu, "ad hoc networks", Comput. Networks, vol.54, no.9, pp. 1460-1469, 2010. https://doi.org/10.1016/j.comnet.2009.11.004
- Prasannajit, B. Anupama, S. Vindhykumari, K.S.R. Subhashini, and G. Vinitha, "An Approach towards Detection of Wormhole Attack in Sensor Networks," 2010.
- D. Kim, D. Kim, H. Park, and S. Yoo, "Performance Evaluation of Routing Protocols for Wireless Sensor Networks in Military Scenarios", pp.101-106, 2011.
- S.G. Smieee, N.C. Mieee, N. Tada, and S. Trivedi, "Scenario-based Performance Comparison of Reactive", Proactive & Hybrid Protocols in MANET, pp.0-4, 2012.
- A. Goyal, "Simulation and Performance Analysis of Routing Protocols in Wireless Sensor Network using QualNet," vol. 52, no.2, pp.47-50, 2012. https://doi.org/10.5120/8178-1499
- R. Ahuja, and A.B. Ahuja, "Performance Evaluation and Comparison of AODV and DSR Routing Protocols in MANETs Under Wormhole Attack," pp.699-702, 2013.
- B. Paul, K.A. Bhuiyan, K. Fatem, and P. P.Das, "Analysis of AOMDV, AODV, DSR and DSDV Routing Protocols for Wireless Sensor Network", 2014.