@incollection{, 1FE643F834D50AEB7E0625F42B7B0EC6 , author={{AkankshaGupta} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1412331 } @incollection{b0, , title={{A Review of Current Routing Attacks in Mobile Ad Hoc Networks}} , author={{ RHKhokhar } and { .AMd } and { SNgadi } and { Manda }} , journal={{International Journal of Computer Science and Security}} , year={2008} } @incollection{b1, , title={{Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols}} , author={{ DVivian } and { EA PAlchieri }} , booktitle={{Network Operations and Management Symposium}} , year={2006} } @incollection{b2, , title={{A Survey of Wormholebased Attacks and their Counter measures in Wireless Sensor Networks}} , author={{ MMeghdadi } and { SOzdemir }} , journal={{IETE Tech Rev}} , year={2011} } @incollection{b3, , title={{Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques -LP3 and NAWA2}} , author={{ SVijayalakshmi } and { SAlbertRabara }} , journal={{International Journal of Computer Applications}} , year={February 2011} } @book{b4, , author={{ RH S JJhaveri } and { DCJinwala }} , title={{Advanced Computing & Communication Technologies (ACCT)}} , year={2012} , note={DoS Attacks in Mobile Ad Hoc Networks: A Survey} } @incollection{b5, , title={{Analysis of wormhole intrusion attacks in MANETS}} , author={{ VMahajan } and { MNatu }} , booktitle={{IEEE Military Communications Conference (MILCOM)}} , year={2008} } @incollection{b6, , title={{Wormhole Detection Mechanism for Ad Hoc Wireless Networks}} , author={{ HSChiu } and { KLui }} , booktitle={{Proceedings of International Symposium on Wireless Pervasive Computing}} International Symposium on Wireless Pervasive Computing , year={2006} } @incollection{b7, , title={{A Comprehensive Review on Wormhole Attacks in MANET}} , author={{ RMaulik } and { NChaki }} , booktitle={{9th International Conference on Computer Information Systems and Industrial Management Applications}} , year={2010} } @incollection{b8, , title={{Packet leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks}} , author={{ Yih-ChunHu } and { AdrianPerrig }} , booktitle={{22nd Annual Joint Conference of the IEEE Computer and Communications Societies}} , year={2003} } @book{b9, , title={{Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks}} , author={{ FNait-Abdesselam } and { BBensaou }} , year={2008} , publisher={IEEE Communications Magazine} } @incollection{b10, , title={{Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR}} , author={{ JohnSBaras } and { GeorgeTheodorakopoulos }} , booktitle={{IEEE Military Communications Conference}} , year={2007} } @incollection{b11, , title={{SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks}} , author={{ Y.-CHu } and { APerrig } and { DBJohnson }} , booktitle={{Proceedings of Fourth IEEE Workshop on Mobile Computing Systems and Applications}} Fourth IEEE Workshop on Mobile Computing Systems and Applications , year={2002} } @book{b12, , title={{Security Threats in Mobile Ad Hoc Network". Paper submitted to the Department of Interaction and System Design}} , author={{ KamanshisBiswas } and { MdAli }} , year={2007} School of Engineering at Blekinge Institute of Technology } @incollection{b13, , title={{Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks}} , author={{ Y.-CHu } and { DBJohnson }} , booktitle={{Wireless Networks}} , year={2005} 11 } @book{b14, , title={{A Survey of Routing Attacks in Mobile Ad Hoc Networks}} , author={{ BounpadithKannhavong } and { HidehisaNakayama } and { AbbasJamalipour }} , year={2007} , publisher={IEEE Wireless Communication} } @incollection{b15, , title={{Packet leashes: a defense against wormhole attacks in wireless networks}} , author={{ Y.-CHu } and { APerrig } and { DBJohnson }} , booktitle={{Twenty-Second Annual Joint Conference of the IEEE Computer and Communications}} , publisher={IEEE Societies} , year={April 2003} } @incollection{b16, , title={{Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach}} , author={{ LLazos } and { RPoovendran } and { PSyverson } and { LWChang }} , booktitle={{Wireless Communications and Networking Conference}} , year={March 2005} } @incollection{b17, , title={{A secure localization approach against wormhole attacks using distance consistency}} , author={{ HonglongChen } and { WeiLou } and { ZhiWang }} , journal={{EURASIP Journal on Wireless Communications and Networking}} , year={April 2010} } @book{b18, , title={{Detection of wormhole attacks in wireless sensor networks}} , author={{ RGraaf } and { IHegazy } and { JHorton }} , year={2010} , publisher={Springer book chapter Ad Hoc Networks} } @incollection{b19, , title={{A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks}} , author={{ AVani } and { DSreenivasaRao }} , journal={{International Journal on Computer Science and Engineering}} , year={June 2011} } @incollection{b20, , title={{Analysis of wormhole intrusion attacks in MANETS}} , author={{ VMahajan } and { MNatu }} , booktitle={{IEEE Military Communications Conference}} , year={2008} } @incollection{b21, , title={{DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks}} , author={{ HSChiu } and { KLui }} , booktitle={{Proceedings of International Symposium on Wireless Pervasive Computing}} International Symposium on Wireless Pervasive Computing , year={2006} } @incollection{b22, , title={{WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks}} , author={{ SChoi } and { DKim } and { JJung }} , booktitle={{International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing}} , year={2008} } @book{b23, , title={{A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET}} , author={{ Chi-SungShang-Ming Jen } and { Laih }} , year={2009} } @incollection{b24, , title={{On Securing MANET Routing Protocol Against Control Packet Dropping}} , author={{ DDjenouri } and { OMahmoudi } and { MMerabti }} , booktitle={{IEEE International Conference on Pervasive Services}} , year={2007} } @incollection{b25, , title={{Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis}} , author={{ MAGorlatova } and { PCMason } and { LLamont } and { RLiscano }} , booktitle={{IEEE Military Communications Conference}} , year={2006} } @incollection{b26, , title={{Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach}} , author={{ NSong } and { LQian } and { XLi }} , booktitle={{Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium}} the 19th IEEE International Parallel and Distributed Processing Symposium , year={2005} } @book{b27, , title={{A New Cluster-based Wormhole Intrusion Detection Algorithm for Mobile Ad-hoc Networks}} , author={{ DBRoy } and { RChaki } and { NChaki }} , year={2009} } @incollection{b28, , title={{A Novel Security model SaW: Security against Wormhole attack in Wireless Sensor Networks}} , author={{ MSSankaran } and { PSDas } and { SSelvakumar }} , booktitle={{Proceedings of International Conference on PDCN}} International Conference on PDCN , year={2009} } @incollection{b29, , title={{Analysis of Detecting Wormhole Attack in Wireless Networks}} , author={{ Khin Sandar Win }} , journal={{World Academy of Science, Engineering and Technology}} , year={2008} } @incollection{b30, , title={{WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks}} , author={{ HVu } and { AKulkarni } and { KSarac } and { N }} , booktitle={{Proceedings of International Conference on Wireless Algorithms Systems and Applications}} International Conference on Wireless Algorithms Systems and Applications , year={2008} } @incollection{b31, , title={{A Comprehensive Review on Wormhole Attacks in MANET}} , author={{ RMaulik } and { NChaki }} , booktitle={{Proceedings of 9th International Conference on Computer Information Systems and Industrial Management Applications}} 9th International Conference on Computer Information Systems and Industrial Management Applications , year={2010} } @book{b32, , title={{A Survey on Sensor Networks}} , author={{ IanFAkykildiz } and { YogeshSankarasubramaniam } and { ErdalCayirci }} , year={2002} , publisher={IEEE Communication Magazine} } @book{b33, , title={{A Survey of Security Issues in Wireless Sensor Networks}} , author={{ YWang } and { GAttebury } and { BRamamurthy }} , year={2006} , publisher={IEEE Communication Surveys Tutorials} } @incollection{b34, , title={{Wireless Sensor Network Security: A Survey}} , author={{ JohnPaulWalters } and { ZhengqiangLiang } and { VipinChaudhary }} , booktitle={{Grid and Pervasive Computing Yang Xiao}} , year={2006} , note={Security in Distributed} }