References
[1]. Ahuja, R., Ahuja, A. B., & Ahuja, P. (2013, December).
Performance evaluation and comparison of AODV and
DSR routing protocols in MANETs under wormhole attack. In
2013, IEEE Second International Conference on Image
Information Processing (ICIIP-2013) (pp. 699-702). IEEE.
https://doi.org/10.1109/ICIIP.2013.6707686
[2]. Alani, M. M. (2014, November). MANET security: A
survey. In 2014, IEEE International Conference on Control
System, Computing and Engineering (ICCSCE 2014) (pp.
559-564). IEEE. https://doi.org/10.1109/ICCSCE.2014.7072 781
[3]. As'adi, H., Haddad, A., Jamshidi, A. (2018). A new
statistical method for wormhole attack detection in
th MANETs. In 2018, 15 International ISC (Iranian Society of
Cryptology) Conference on Information Security and
Cryptology (ISCISC). https://doi.org/10.1109/ISCISC.2018.
8546943
[4]. Cabrera, A. T., Mozos, A. G., & Casilari, E. (2010,
September). On the suitability of using the residual lifetime
as a routing metric in manets. In Telecommunications: The
st Infrastructure for the 21 Century (pp. 1-6).
[5]. Douceur, J. R. (2002). The Sybil attack. In Proceedings
st of the 1 International Workshop on Peer-to-Peer Systems
(IPTPS'02) (pp. 251-260).
[6]. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003a, March).
Packet leashes: A defense against wormhole attacks in
wireless networks. In IEEE INFOCOM 2003 Twenty-second
Annual Joint Conference of the IEEE Computer and
Communications Societies (Vol. 3, pp. 1976-1986). IEEE.
[7]. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003b,
September). Rushing attacks and defense in wireless ad
nd hoc network routing protocols. In Proceedings of the 2
ACM workshop on Wireless security (pp. 30-40).
[8]. Jha, H. N., Gupta, S., & Maity, D. (2020). Effect of
wormhole attacks on MANET. In Design Frameworks for
Wireless Networks (pp. 177-195). Singapore: Springer.
https://doi.org/10.1007/978-981-13-9574-1
[9]. Joshi, P. (2011). Security issues in routing protocols in
MANETs at network layer. Procedia Computer Science, 3,
954-960. https://doi.org/10.1016/j.procs.2010.12.156
[10]. Karlsson, J., Dooley, L. S., Pulkkis, G. (2011). A new
MANET wormhole detection algorithm based on traversal
time and hop count analysis. International Journal of
Sensors, 11(12), 11122-11140. https://doi.org/10.3390/s11
1211122
[11]. Kong, J., & Hong, X. (2003, June). ANODR:
Anonymous on demand routing with untraceable routes
th for mobile ad-hoc networks. In Proceedings of the 4 ACM
International Symposium on Mobile Ad-Hoc Networking &
Computing (pp. 291-302). https://doi.org/10.1145/7784
15.778449
[12]. Rai, A., RanjanTewari, R., & Upadhyay, S. K. (2010).
Different types of attacks on integrated MANET-internet
communication. International Journal of Computer
Science and Security (IJCSS), 4(3), 265-274.
[13]. Sarkar, D., Choudhury, S., & Majumder, A. (2018).
Enhanced-Ant-AODV for optimal route selection in mobile
ad-hoc network. Journal of King Saud University-Computer
and Information Sciences, 1–25. https://doi.org/10.1016/j.
jksuci.2018.08.013
[14]. Xiao, H., Ibrahim, D. M., & Christianson, B. (2014,
April). Energy consumption in mobile ad hoc networks. In
2014, IEEE Wireless Communications and Networking
Conference (WCNC) (pp. 2599-2604). IEEE. https://doi.
org/10.1109/WCNC.2014.6952818
[15]. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004).
Security in mobile ad hoc networks: Challenges and
solutions. IEEE Wireless Communications, 11(1), 38-47.
https://doi.org/10.1109/MWC.2004.1269716