Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci,
E. (2002). Wireless sensor networks: a survey.
Computer Networks, 38(4), 393–422.
Aliady, W. A., & Al-Ahmadi, S. A. (2019). Energy
preserving secure measure against wormhole attack in
wireless sensor networks. IEEE Access, 7, 84132–
84141.
https://doi.org/10.1109/ACCESS.2019.2924283
An, G. H., & Cho, T. H. (2021). Wormhole detection using
encrypted node IDs and hop counts in the event report
of statistical en-route filtering. International Journal of
Computer Networks and Applications, 8(4), 390–399.
https://doi.org/10.22247/ijcna/2021/209705
Babaeer, H. A., & Al-Ahmadi, S. A. (2020). Efficient and
Secure Data Transmission and Sinkhole Detection in a
Multi-Clustering Wireless Sensor Network Based on
Homomorphic Encryption and Watermarking. IEEE
Access, 8, 92098–92109. https://doi.org/10.1109/
ACCESS.2020.2994587
Ban, X., Sarkar, R., & Gao, J. (2011). Local connectivity
tests to identify wormholes in wireless networks.
Proceedings of the Twelfth ACM International
Symposium on Mobile Ad Hoc Networking and
Computing, 1–11.
Buch, D., & Jinwala, D. (2011). Prevention of Wormhole
Attack in Wireless Sensor Network. International
Journal of Network Security & Its Applications, 3(5),
85–98. https://doi.org/10.5121/ijnsa.2011.3507
Buttyán, L., Dóra, L., & Vajda, I. (2005). Statistical
wormhole detection in sensor networks. European
Workshop on Security in Ad-Hoc and Sensor Networks,
128–141.
Chiu, H. S., & Lui, K.-S. (2006). DelPHI: wormhole
detection mechanism for ad hoc wireless networks.
2006 1st International Symposium on Wireless
Pervasive Computing, 6-pp.
Chu, T.-H., Kuo, S.-Y., & Chou, Y.-H. (2019). Using
Quantum-inspired Tabu Search Algorithm with Logic
Operation and Moving Average Indicator for
Wormhole Attack Detection in a WSN. Journal of
Internet Technology, 20(1), 167–176.
C.P, V., & Saviour Devaraj, A. F. (2013). MLDW- A
MultiLayered Detection mechanism for Wormhole
attack in AODV based MANET. International Journal
of Security, Privacy and Trust Management, 2(3), 29–
41. https://doi.org/10.5121/ijsptm.2013.2303
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008).
Reputation-based framework for high integrity sensor
networks. ACM Transactions on Sensor Networks
(TOSN), 4(3), 1–37.
Gautam, A. K., & Kumar, R. (2018). A robust trust model
for wireless sensor networks. 2018 5th IEEE Uttar
Pradesh Section International Conference on Electrical,
Electronics and Computer Engineering (UPCON), 1–5.
Ghugar, U., & Pradhan, J. (2019). A Review on Wormhole
Attacks in Wireless Sensor Networks Intrusion
detection of various attack in WSN View project A
Review on Wormhole Attacks in Wireless Sensor
Networks. International Journal of Information
Communication Technology and Digital Convergence,
4(1), 32–45. https://www.researchgate.net/publication/
336798552
Gómez Mármol, F., & Martínez Pérez, G. (2011). Providing
trust in wireless sensor networks using a bio-inspired
technique. Telecommunication Systems, 46(2), 163–
180. https://doi.org/10.1007/s11235-010-9281-7
Gupta, S., Kar, S., & Dharmaraja, S. (2011). WHOP:
Wormhole attack detection protocol using hound
packet. 2011 International Conference on Innovations
in Information Technology, 226–231.
Ho, J. W., & Wright, M. (2017). Distributed detection of
sensor worms using sequential analysis and remote
software attestations. IEEE Access, 5, 680–695.
https://doi.org/10.1109/ACCESS.2017.2648853
Johnson, M. O., Siddiqui, A., & Karami, A. (n.d.). A
Wormhole Attack Detection and Prevention Technique
in Wireless Sensor Networks.
Ju, S. (2012). A lightweight key establishment in wireless
sensor network based on elliptic curve cryptography.
2012 IEEE International Conference on Intelligent
Control, Automatic Detection and High-End
Equipment, 138–141.
Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (n.d.).
The EigenTrust Algorithm for Reputation Management
in P2P Networks.
Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M.
I., Min‐Allah, N., Kolodziej, J., Wang, L., Zeadally, S.,
& Chen, D. (2013). Comparative study of trust and
reputation systems for wireless sensor networks.
Security and Communication Networks, 6(6), 669–688.
Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp:
Detection and isolation of the wormhole attack in static
multihop wireless networks. Computer Networks,
51(13), 3750–3772.
Mármol, F. G., Marín-Blázquez, J. G., & Pérez, G. M.
(2010). Linguistic fuzzy logic enhancement of a trust
mechanism for distributed networks. Proceedings -
10th IEEE International Conference on Computer and
Information Technology, CIT-2010, 7th IEEE
International Conference on Embedded Software and
Systems, ICESS-2010, ScalCom-2010, 838–845.
https://doi.org/10.1109/CIT.2010.158
Mármol, F. G., & Pérez, G. M. (2009). TRMSim-WSN,
trust and reputation models simulator for wireless
sensor networks. IEEE International Conference on
Communications. https://doi.org/10.1109/ICC.2009.51
99545
Mármol, F. G., & Pérez, G. M. (2012). TRIP, a trust and
reputation infrastructure-based proposal for vehicular
ad hoc networks. Journal of Network and Computer
Applications, 35(3), 934–941.
Padmavathi, G., & Shanmugapriya, M. D. (2009). A Survey
of Attacks, Security Mechanisms and Challenges in
Wireless Sensor Networks. In IJCSIS) International
Journal of Computer Science and Information Security
(Vol. 4, Issue 1).
Patel, M. A., & Patel, M. M. (2018). Wormhole attack
detection in wireless sensor network. 2018
International Conference on Inventive Research in
Computing Applications (ICIRCA), 269–274.