D. Estrin, R. Govindan, J. Heideman and S. Kumar., “Next century challenges: Scalable Coordination in Sensor Networks”, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp.263-270, USA, 1999.10.1145/313451.313556
Habib M.Ammari, Sajal K. Das, “A trade-off between energy and delay in data dessemination for wireless sensor networks using transmision range slicing”, Computer Communications, Vol 31, No. 9, 2008, pp.1687-1704.10.1016/j.comcom.2007.11.006
Karlof C, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, Vol 1, No. 2/3, 2003, pp. 293-315.10.1016/S1570-8705(03)00008-8
Y.-C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976-1986, USA, March 30 - April 3, 2003.
[7]L.X. Hu and D Evans, “Using directional antennas to prevent wormhole attacks”,
Proceedings of Network and Distributed System Security Symposium, USA, February 5-6, 2004.
S. Choi and D.Y. Kim, D. H. Lee, J.I. Jung, “WAP: Wormhole attack prevention algorithm in mobile Ad Hoc networks”, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 3434-348, USA, June 11-13, 2008.
S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.10.1016/j.adhoc.2008.09.005
G. Lee, D. K. Kim, J. Seo, “An approach to mitigate wormhole attack in wireless Ad Hoc networks”, Proceedings of 2008 International Conference on Information Security and Assurance, pp. 220-225, Korea, April 24-26, 2009.
J Zhu, KL Hung, B Bensaou, F Nait-Abdesselam, “Rate-lifetime tradeoff for reliable communication in wireless sensor networks”, Computer Networks, Vol. 52, No. 1, 2007, pp. 2543.10.1016/j.comnet.2007.09.011
A. Rasheed and R. Mahapatra, “Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks”, Proceedings of the 28th IEEE International Performance Computing and Communications Conference, pp..216-222, USA, December 14-16, 2009.10.1109/PCCC.2009.5403840
R. Maheshwari and J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 105-115, USA, May 6-12, 2007.10.1109/INFCOM.2007.21
T. Hayajneh and P. Krishnamurthy, D. Tipper, “DeWorm: a simple protocol to detect wormhole attacks in wireless Ad hoc networks”, Proceedings of the Third International Conference on Network and System Security, pp. 73-80, Australia, October 19-21, 2009.10.1109/NSS.2009.85
D. Z. Dong and M. Li, Y. H. Liu, X. Y. Li, X. K. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks”, IEEE/ACM Transactions on Networking, Vol 19, No. 6, 2011, pp. 1787-1796.10.1109/TNET.2011.2163730
S. M. Jen and C. S. Laih, W. C. Kuo, “A hop-count analysis scheme for avoiding wormhole attacks in MANET”, Sensors, Vol 19, No. 6, 2009, pp. 5022-5039.10.3390/s90605022329195122408566
L. J. Qian and N. Song, X. F. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach”, Journal of Network and Computer Applications, Vol 30, 2007, pp. 308-330.10.1016/j.jnca.2005.07.003
S. J. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in Ad hoc networks”, Proceedings of IEEE International Conference on Communications, pp. 3201-3205, Finland, June 11-14, 2001.