TY - JOUR AU - Akyildiz, I. F. AU - Wang, X. AU - Wang, W. PY - 2005 DA - 2005// TI - Wireless mesh networks: a survey JO - J. Comput. Netw. ISDN Syst VL - 47 UR - https://doi.org/10.1016/j.comnet.2004.12.001 DO - 10.1016/j.comnet.2004.12.001 ID - Akyildiz2005 ER - TY - CHAP AU - Zhang, W. AU - Wang, Z. AU - Das, S. K. AU - Hassan, M. PY - 2008 DA - 2008// TI - Security Issues in Wireless Mesh Networks BT - Book, Wireless Mesh Networks: Architectures and Protocols PB - Springer CY - New York ID - Zhang2008 ER - TY - CHAP AU - Hu, Y. AU - Perrig, A. AU - Johnson, D. PY - 2003 DA - 2003// TI - Packet leashes: a defence against wormhole attacks in wireless networks BT - Proceedings of the 22nd IEEE International Conference on Computer Communications PB - IEEE CY - San Francisco ID - Hu2003 ER - TY - BOOK PY - 2011 DA - 2011// TI - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 10: Mesh Networking PB - IEEE CY - New York ID - ref4 ER - TY - STD TI - Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H: ODSBR: an on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Security 2008., 10(4): ID - ref5 ER - TY - JOUR AU - Khabbazian, M. AU - Mercier, H. AU - Bhargava, V. K. PY - 2009 DA - 2009// TI - Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks JO - IEEE Trans. Wireless Commun VL - 8 UR - https://doi.org/10.1109/TWC.2009.070536 DO - 10.1109/TWC.2009.070536 ID - Khabbazian2009 ER - TY - CHAP AU - Choi, S. AU - Kim, D. Y. AU - Lee, D. H. AU - Jung, J. I. PY - 2008 DA - 2008// TI - WAP: Wormhole attack prevention algorithm in mobile ad hoc networks BT - Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing PB - IEEE CY - Taichung ID - Choi2008 ER - TY - CHAP AU - Wang, X. AU - Wong, J. PY - 2007 DA - 2007// TI - An end-to-end detection of wormhole attack in wireless ad hoc networks BT - Proceedings of the Thirty-First Annual International Computer Software and Applications Conference PB - IEEE CY - Beijing ID - Wang2007 ER - TY - JOUR AU - Tun, Z. AU - Maw, A. H. PY - 2008 DA - 2008// TI - Wormhole attack detection in wireless sensor networks JO - J. World Acad. Sci. Eng. Technol VL - 46 ID - Tun2008 ER - TY - CHAP AU - Tran, P. AU - Hung, L. X. AU - Lee, Y. K. AU - Lee, S. AU - Lee, H. PY - 2007 DA - 2007// TI - TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks BT - Proceedings of Fourth IEEE Consumer Communication and Networking Conference PB - IEEE CY - Las Vegas UR - https://doi.org/10.1109/CCNC.2007.122 DO - 10.1109/CCNC.2007.122 ID - Tran2007 ER - TY - CHAP AU - Korkmaz, T. PY - 2005 DA - 2005// TI - Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks BT - Proceedings of International Conference on Information Technology: Coding and Computing PB - IEEE CY - Las Vegas ID - Korkmaz2005 ER - TY - CHAP AU - Capkun, S. AU - Buttyan, L. AU - Hubaux, J. P. PY - 2003 DA - 2003// TI - SECTOR: Secure tracking of node encounters in multi-hop wireless networks BT - Proceedings of the First ACM Workshop on Security of ad hoc and Sensor Networks PB - ACM CY - Virginia UR - https://doi.org/10.1145/986858.986862 DO - 10.1145/986858.986862 ID - Capkun2003 ER - TY - JOUR AU - Poovendran, R. AU - Lazos, L. PY - 2007 DA - 2007// TI - A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks JO - ACM J. Wireless Netw VL - 13 UR - https://doi.org/10.1007/s11276-006-3723-x DO - 10.1007/s11276-006-3723-x ID - Poovendran2007 ER - TY - CHAP AU - Wang, Y. AU - Zhang, Z. AU - Wu, J. PY - 2010 DA - 2010// TI - A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information BT - Proceedings of IEEE Fifth International Conference on Networking, Architecture and Storage PB - IEEE CY - Macau ID - Wang2010 ER - TY - CHAP AU - Ban, X. AU - Sarkar, R. AU - Gao, J. PY - 2011 DA - 2011// TI - Local connectivity tests to identify wormholes in wireless networks BT - Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing PB - ACM CY - Paris ID - Ban2011 ER - TY - CHAP AU - Znaidi, W. AU - Minier, M. AU - Babau, J. P. PY - 2008 DA - 2008// TI - Detecting wormhole attacks in wireless networks using local neighborhood information BT - Proceedings of IEEE international Symposium on Personal, Indoor and Mobile Radio Communications PB - IEEE CY - Cannes ID - Znaidi2008 ER - TY - JOUR AU - Su, M. Y. PY - 2010 DA - 2010// TI - WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks JO - Comput. Security VL - 29 UR - https://doi.org/10.1016/j.cose.2009.09.005 DO - 10.1016/j.cose.2009.09.005 ID - Su2010 ER - TY - CHAP AU - Matam, R. AU - Tripathy, S. PY - 2012 DA - 2012// TI - Defence against wormhole attacks in wireless mesh networks BT - Proceedings of the 8th International Conference on Information Systems and Security PB - Springer LNCS CY - Guwahati UR - https://doi.org/10.1007/978-3-642-35130-3_13 DO - 10.1007/978-3-642-35130-3_13 ID - Matam2012 ER - TY - CHAP AU - Zhou, J. AU - Cao, J. AU - Zhang, J. AU - Zhang, C. AU - Yu, Y. PY - 2012 DA - 2012// TI - Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed BT - Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications PB - IEEE CY - Fukuoka UR - https://doi.org/10.1109/AINA.2012.81 DO - 10.1109/AINA.2012.81 ID - Zhou2012 ER - TY - CHAP AU - Hayajneh, T. AU - Krishnamurthy, P. AU - Tipper, D. PY - 2009 DA - 2009// TI - DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks BT - Proceedings of Third International Conference on Network and System Security PB - IEEE CY - Gold Coast ID - Hayajneh2009 ER - TY - BOOK AU - Johnson, D. B. AU - Maltz, D. A. AU - Hu, Y. C. PY - 2004 DA - 2004// TI - The dynamic source routing protocol for mobile ad-hoc network (DSR), IETF internet draft PB - IETF MANET Working Group CY - Fremont ID - Johnson2004 ER - TY - CHAP AU - Eriksson, J. AU - Faloutsos, M. AU - Krishnamurthy, S. PY - 2007 DA - 2007// TI - Routing amid colluding attackers BT - Proceedings of IEEE International Conference on Network Protocols PB - IEEE CY - Beijing ID - Eriksson2007 ER - TY - BOOK AU - Perkins, C. E. AU - Royer, E. M. AU - Das, S. R. PY - 2004 DA - 2004// TI - Ad hoc on-demand distance vector (AODV) routing, IETF internet draft PB - IETF MANET Working Group CY - Fremont, California USA ID - Perkins2004 ER - TY - JOUR AU - Swathi, B. AU - Tripathy, S. AU - Matam, R. PY - 2012 DA - 2012// TI - Secure peer-link establishment in wireless mesh networks JO - Adv. Intell. Syst. Comput VL - 176 UR - https://doi.org/10.1007/978-3-642-31513-8_19 DO - 10.1007/978-3-642-31513-8_19 ID - Swathi2012 ER - TY - JOUR AU - Clark, B. N. AU - Colbourn, C. J. AU - Johnson, D. S. PY - 1990 DA - 1990// TI - Unit disk graphs JO - Discrete Math. J VL - 86 UR - https://doi.org/10.1016/0012-365X(90)90358-O DO - 10.1016/0012-365X(90)90358-O ID - Clark1990 ER - TY - CHAP AU - De Couto, D. AU - Aguayo, D. AU - Bicket, J. AU - Morris, R. PY - 2003 DA - 2003// TI - A high-throughput path metric for multi-hop wireless routing BT - Proceedings of MobiCom PB - ACM CY - San Diego ID - De Couto2003 ER - TY - CHAP AU - Draves, R. AU - Padhye, J. AU - Zill, B. PY - 2004 DA - 2004// TI - Routing in multi-radio multi-hop wireless mesh networks BT - Proceedings of ACM MobiCom PB - ACM CY - Philadelphia ID - Draves2004 ER - TY - STD TI - The OMNeT++ Network Simulator . Accessed 23 September 2011 http://www.omnetpp.org UR - http://www.omnetpp.org ID - ref28 ER -