[1]
I.F. Akyildiz, X. Wang.: A survey on wireless mesh networks. J. IEEE Radio Communications, 43(9), 23-30 (2005).
Google Scholar
[2]
X. Wang, S. Choi, J.P. Hubaux.: Wireless mesh networking: theories, protocols, and systems. IEEE Wireless Communications, 13(2), 8-9 (2006).
DOI: 10.1109/mwc.2006.1632475
Google Scholar
[3]
Khalil, S. Bagchi, N.B. Shroff.: MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks. Ad Hoc Networks, 6, 344-362(2008).
DOI: 10.1016/j.adhoc.2007.02.001
Google Scholar
[4]
P. Nagrath, B. Gupta. : Wormhole Attacks in Wireless Ad hoc Networks and their Counter Measurements: A Survey. In: 3rd International Conference on Electronics Computer Technology, pp.245-250. IEEE Press, New York(2011).
DOI: 10.1109/icectech.2011.5942091
Google Scholar
[5]
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, etc.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp.78-87. IEEE Press, New York(2002).
DOI: 10.1109/icnp.2002.1181388
Google Scholar
[6]
Using directional antennas to prevent wormhole attacks, http: /www. isoc. org/isoc/conferences/ndss/04/proceedings/Papers/Hu. pdf.
Google Scholar
[7]
Y.C. Hu, A. Perrig, D.B. Johnson.: Packet leashes: a defense against wormhole attacks in wireless networks. In: 22nd INFOCOM, pp.1976-1986. IEEE Press, New York (2003).
DOI: 10.1109/infcom.2003.1209219
Google Scholar
[8]
Rushing attacks and defense in wireless ad hoc network routing protocols, http: /www. eecs. umich. edu/~zmao/eecs589/papers/Hu03. pdf.
Google Scholar
[9]
H. S. Chiu, K. S. Lui.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 2nd Wireless Pervasive Computing, pp.1-6. IEEE Press, New York (2006).
DOI: 10.1109/iswpc.2006.1613586
Google Scholar
[10]
X. Wang, J. Wong.: An end-to-end detection of wormhole attack in wireless ad hoc networks. In: 31st Annual international Computer Software and Applications Conference, pp.34-41. IEEE Press, New York, (2007).
DOI: 10.1109/compsac.2007.63
Google Scholar
[11]
L. Lazos, R. Poovendran, C. Meadows, et al.: Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In: IEEE Wireless Communications and Networking Conference, PP. 1193-1199. IEEE Press, New York, (2005).
DOI: 10.1109/wcnc.2005.1424678
Google Scholar
[12]
M. Khabbazian, H. Mercier, and V.K. Bhargava.: Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks. IEEE Transactions on Wireless Communications. 8(2), 736-745(2009).
DOI: 10.1109/twc.2009.070536
Google Scholar
[13]
D. ezun Dong, M. IEEE, M. Li, et al.: Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks. IEEE Transactions on Networking. 19(6), 1-9(2011).
DOI: 10.1109/tnet.2011.2163730
Google Scholar
[14]
S. Gupta, S. Kar and S Dharmaraja.: WHOP: Wormhole Attack Detection Protocol using Hound Packet. In: 7th International Conference on Innovations in Information Technology, pp.226-231. IEEE Press, New York(2011).
DOI: 10.1109/innovations.2011.5893822
Google Scholar
[15]
C.E. Perkins, E.M. Royer.: Ad hoc on-demand distance vector routing. In: 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.90-100. IEEE Press, New York(1990).
DOI: 10.1109/mcsa.1999.749281
Google Scholar
[16]
R. Draves, J. Padhye, B. Zill.: Routing in multi-radio, multi-hop wireless mesh networks. In: 10th ACM Annual International Conference on Mobile Computing and Networking, pp.114-128. ACM, New York(2004).
DOI: 10.1145/1023720.1023732
Google Scholar