{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T15:36:32Z","timestamp":1773243392874,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"value":"9780387754611","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75462-8_19","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T18:53:00Z","timestamp":1194375180000},"page":"267-279","source":"Crossref","is-referenced-by-count":19,"title":["Detecting Wormhole Attacks in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yurong","family":"Xu","sequence":"first","affiliation":[]},{"given":"Guanling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"James","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Fillia","family":"Makedon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"19_CR1_","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I Akyildiz","year":"2002","unstructured":"I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, A survey of sensor networks, IEEE Communications, vol. 40(8), pp. 102-114, 2002.","journal-title":"IEEE Communications"},{"key":"19_CR2_","doi-asserted-by":"crossref","unstructured":"S. \u010capkun, L. Butty\u00e1n and J. Hubaux, SECTOR: Secure tracking of node encounters in multi-hop wireless networks, Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.","DOI":"10.1145\/986858.986862"},{"issue":"7","key":"19_CR3_","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1016\/j.jpdc.2005.12.011","volume":"66","author":"W Du","year":"2006","unstructured":"W. Du, L. Fang and P. Ning, LAD: Localization anomaly detection for wireless sensor networks, Journal of Parallel and Distributed Computing, vol. 66(7), pp. 874-886, 2006.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"19_CR4_","unstructured":"L. Hu and D. Evans, Using directional antennas to prevent wormhole at- tacks, Proceedings of the Eleventh Network and Distributed System Security Symposium, pp. 131-141, 2004."},{"key":"19_CR5_","volume-title":"Wormhole Detection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science","author":"Y Hu","year":"2002","unstructured":"Y. Hu, A. Perrig and D. Johnson, Wormhole Detection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, Houston, Texas, 2002."},{"key":"19_CR6_","first-page":"1976","volume":"3","author":"Y Hu","year":"2003","unstructured":"Y. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986, 2003.","journal-title":"Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"19_CR7_","doi-asserted-by":"crossref","unstructured":"J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia and B. Bhargava, Low- cost attacks against packet delivery, localization and time synchronization services in underwater sensor networks, Proceedings of the Fourth ACM Workshop on Wireless Security, pp. 87-96, 2005.","DOI":"10.1145\/1080793.1080808"},{"issue":"1","key":"19_CR8_","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1077391.1077395","volume":"1","author":"L Lazos","year":"2005","unstructured":"L. Lazos and R. Poovendran, SeRLoc: Robust localization for wireless sensor networks, ACM Transactions on Sensor Networks, vol. 1(1), pp. 73-100, 2005.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"19_CR9_","unstructured":"D. Liu, P. Ning and W. Du, Attack-resistant location estimation in sensor networks, Proceedings of the Fourth International Symposium on Informa- tion Processing in Sensor Networks, pp. 99-106, 2005."},{"key":"19_CR10_","unstructured":"S. McCanne and S. Floyd, The network simulator -ns-2 (nsnam. isi. edu\/nsnam\/index. php\/User Information), 2007."},{"key":"19_CR11_","doi-asserted-by":"crossref","unstructured":"J. Newsome, E. Shi, D. Song and A. Perrig, The sybil attack in sensor networks: Analysis and defenses, Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.","DOI":"10.1145\/984622.984660"},{"key":"19_CR12_","unstructured":"P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002."},{"issue":"1","key":"19_CR13_","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","volume":"13","author":"R Poovendran","year":"2007","unstructured":"R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Networks, vol. 13(1), pp. 27-59, 2007.","journal-title":"Wireless Networks"},{"key":"19_CR14_","unstructured":"The Rice Monarch Project, Wireless and mobility extensions to ns-2 ( www.monarch. cs. cmu. edu\/cmu-ns. html ), 2007."},{"key":"19_CR15_","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/ETFA.2003.1247753","volume":"1","author":"M Vieira","year":"2003","unstructured":"M. Vieira, C. Coelho Jr., D. da Silva Jr. and J. da Mata, Survey of wireless sensor network devices, Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 537-544, 2003.","journal-title":"Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation"},{"key":"19_CR16_","doi-asserted-by":"crossref","unstructured":"W. Wang and B. Bhargava, Visualization of wormholes in sensor networks, Proceedings of the ACM Workshop on Wireless Security, pp. 51-60, 2004.","DOI":"10.1145\/1023646.1023657"},{"issue":"10","key":"19_CR17_","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A Wood","year":"2002","unstructured":"A. Wood and J. Stankovic, Denial of service in sensor networks, IEEE Computer, vol. 35(10), pp. 54-62, 2002.","journal-title":"IEEE Computer"},{"key":"19_CR18_","unstructured":"Y. Xu, J. Ford and F. Makedon, A variation on hop counting for geographic routing, Proceedings of the Third IEEE Workshop on Embedded Networked Sensors, 2006."},{"key":"19_CR19_","unstructured":"J. Zheng, Low rate wireless personal area networks: ns-2 simulator for 802. 15. 4 (release v1. 1) (ees2cy. engr. ccny. cuny. edu\/zheng\/pub), 2007."}],"container-title":["IFIP International Federation for Information Processing","Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75462-8_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T23:51:26Z","timestamp":1619653886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75462-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754611"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75462-8_19","relation":{},"subject":[]}}