[1] R. Sheikh, M. Singh Chande, and D. Mishra, "Security issues in manet: A review," in Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On, pp. 1-4, 2010.
[2] P. Joshi, "Security issues in routing protocols in MANETs at network layer," Procedia Computer Science, vol. 3, pp. 954-960, 2011.
[3] S. Banerjee and K. Majumder, "A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network," In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, Recent Trends in Computer Networks and Distributed Systems Security, Springer, vol. 335, pp. 372-384, 2012.
[4] M.-Y. Su, "WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks," Computers & Security, vol. 29, pp. 208-224, Mar. 2010.
[5] R. Stoleru, H. Wu, and H. Chenji, "Secure neighbor discovery and wormhole localization in mobile ad hoc networks," Ad Hoc Networks, vol. 10, pp. 1179-1190, Sept. 2012.
[6] C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," in Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, pp. 90-100, 1999.
[7] R. Jhaveri, S. Patel, and D. Jinwala, "Dos attacks in mobile ad hoc networks: A survey," in Advanced Computing Communication Technologies (ACCT), 2012 Second International Conference on, pp. 535-541, 2012.
[8] Supriya and M. Khari, "Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey," Advances in Computer Science and Information Technology. Networks and Communications, vol. 84, pp. 119-124, 2012.
[9] T. Giannetsos and T. Dimitriou, "LDAC : A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 618-643, 2014.
[10] J. Liu, H. Chen, Z. Zhen, and S. Mingbo, "Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network," in Proceedings of International Conference on Computer Science and Information Technology, pp. 147-154, 2014.
[11] J. Zhou, J. Cao, J. Zhang, C. Zhang, and Y. Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed," in 26th International Conference on Advanced Information Networking and Applications (AINA) IEEE, pp. 59-66, 2012.
[12] S. Hazra and S. Setua, "Trusted Routing in AODV Protocol Against Wormhole Attack," Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol. 164, pp. 259-269, 2012.
[13] K. Fall and K. Varadhan, "The ns Manual," The VINT Project, 2011.
[14] Y.-C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1976-1986, 2003.
[15] H. S. Chiu and K.-S. Lui, "Delphi: wormhole detection mechanism for ad hoc wireless networks," in Wireless Pervasive Computing, 2006 1st International Symposium on, pp. 6-12, 2006.
[16] K. Chanchal and D. Lobiyal, "NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack," Quality, Reliability, Security and Robustness in Heterogeneous Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 485-495, 2013.
[17] F. Shi, W. Liu, D. Jin, and J. Song, "A countermeasure against wormhole attacks in manets using analytical hierarchy process methodology," Electronic Commerce Research. Springer US, vol. 13, no. 3, pp. 329-345, 2013.
[18] S. Choi, D.-Y. Kim, D. hyeon Lee, and J. il Jung, "Wap: Wormhole attack prevention algorithm in mobile ad hoc networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on, pp. 343-348, 2008.
[19] S. ul Haq and F. B. Hussain, "Out-of-band wormhole attack detection in MANETS," in the Proceedings of the 9th Australian Information Security Management Conference, (Perth Western Australia), 2011.
[20] M. Su, "A Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks," Proceedings of the World Congress on Engineering, vol. II, pp. 2-6, 2012.
[21] P. Sharma and A. Trivedi, "Prevention of Wormhole Attack in Ad-Hoc Network," International Journal of Computer Applications Special Issue on Electronics, Information and Communication Engineering -ICEICE, no. 5, pp. 13-17, 2011.
[22] A. Malhotra, D. Bhardwaj, and A. Garg, "Wormhole attack prevention using clustering and digital signatures in reactive routing," in Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, pp. 122-126, 2012.
[23] S. Rhee, Injong and Shin, Minsu and Hong, Seongik and Lee, Kyunghan and Kim, Seong Joon and Chong, "On the Levy-walk Nature of Human Mobility," IEEE/ACM Trans. Netw., vol. 19, no. 3, pp. 630-643, 2011.