{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:03Z","timestamp":1748751003822,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238289"},{"type":"electronic","value":"9783319238296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23829-6_17","type":"book-chapter","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T11:06:53Z","timestamp":1446894413000},"page":"222-238","source":"Crossref","is-referenced-by-count":3,"title":["Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Eirini","family":"Karapistoli","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[]},{"given":"Anastasios A.","family":"Economides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,8]]},"reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks - a survey. Comput. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw."},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X Chen","year":"2009","unstructured":"Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surveys Tuts. 11(2), 52\u201373 (2009)","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y Zhou","year":"2008","unstructured":"Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surveys Tuts. 10(3), 6\u201328 (2008)","journal-title":"IEEE Commun. Surveys Tuts."},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2002)","key":"17_CR4","DOI":"10.1109\/SNPA.2003.1203362"},{"issue":"2","key":"17_CR5","first-page":"1","volume":"11","author":"SK Singh","year":"2011","unstructured":"Singh, S.K., Singh, M.P., Singh, D.K.: A survey on network security and attack defense mechanism for wireless sensor networks. International Journal of Computer Trends and Technology 11(2), 1\u20139 (2011)","journal-title":"International Journal of Computer Trends and Technology"},{"unstructured":"Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002, pp. 78\u201387 (2002)","key":"17_CR6"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol. 3, pp. 1976\u20131986. IEEE Societies (2003)","key":"17_CR7","DOI":"10.1109\/INFCOM.2003.1209219"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TWC.2009.070536","volume":"8","author":"M Khabbazian","year":"2009","unstructured":"Khabbazian, M., Mercier, H., Bhargava, V.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wireless Commun. 8(2), 736\u2013745 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure link state routing for mobile ad hoc networks. In: Symposium on Applications and the Internet Workshops, pp. 379\u2013383. IEEE Computer Society (2003)","key":"17_CR9","DOI":"10.1109\/SAINTW.2003.1210190"},{"doi-asserted-by":"crossref","unstructured":"Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc, pp. 1\u201311 (2011)","key":"17_CR10","DOI":"10.1145\/2107502.2107519"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"M-Y Su","year":"2010","unstructured":"Su, M.-Y.: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Secur. 29(2), 208\u2013224 (2010)","journal-title":"Comput. Secur."},{"unstructured":"Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless ad-hoc networks. In: 31st Annual International Computer Software and Applications Conference, 2007. COMPSAC 2007, vol. 1, pp. 39\u201348 (2007)","key":"17_CR12"},{"issue":"13","key":"17_CR13","doi-asserted-by":"publisher","first-page":"3750","DOI":"10.1016\/j.comnet.2007.04.001","volume":"51","author":"I Khalil","year":"2007","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750\u20133772 (2007)","journal-title":"Comput. Netw."},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/2945.981847","volume":"8","author":"DA Keim","year":"2002","unstructured":"Keim, D.A.: Information visualization and visual data mining. IEEE Trans. Visual Comput. Graphics 8(1), 1\u20138 (2002)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"issue":"5","key":"17_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCG.2004.26","volume":"24","author":"ST Teoh","year":"2004","unstructured":"Teoh, S.T., Ma, K.-L., Wu, S.F., Jankun-Kelly, T.J.: Detecting flaws and intruders with visual data analysis. IEEE Comput. Graph. Appl. 24(5), 27\u201335 (2004)","journal-title":"IEEE Comput. Graph. Appl."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCG.2006.5","volume":"26","author":"JJ Thomas","year":"2006","unstructured":"Thomas, J.J., Cook, K.A.: A visual analytics agenda. IEEE Comput. Graphics Appl. 26, 10\u201313 (2006)","journal-title":"IEEE Comput. Graphics Appl."},{"unstructured":"Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H., Nita-Rotaru, C.: On the survivability of routing protocols in ad hoc wireless networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005, pp. 327\u2013338, September 2005","key":"17_CR17"},{"issue":"4","key":"17_CR18","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/1284680.1341892","volume":"10","author":"B Awerbuch","year":"2008","unstructured":"Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: Odsbr: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4), 6:1\u20136:35 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: ACM workshop on Wireless Security, pp. 51\u201360. ACM Press (2004)","key":"17_CR19","DOI":"10.1145\/1023646.1023657"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Lu, A.: Interactive wormhole detection in large scale wireless networks. In: IEEE Symposium on Visual Analytics Science and Technology, pp. 99\u2013106 (2006)","key":"17_CR20","DOI":"10.1109\/VAST.2006.261435"},{"doi-asserted-by":"crossref","unstructured":"Karapistoli, E., Economides, A.: Wireless sensor network security visualization. In: 2012 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 850\u2013856, October 2012","key":"17_CR21","DOI":"10.1109\/ICUMT.2012.6459781"},{"unstructured":"IEEE 802.15.4 $$^{{\\rm TM}} $$ TM -2011: IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)","key":"17_CR22"},{"issue":"5","key":"17_CR23","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TVCG.2009.23","volume":"15","author":"GM Draper","year":"2009","unstructured":"Draper, G.M., Livnat, Y., Riesenfeld, R.F.: A survey of radial methods for information visualization. IEEE Trans. Vis. Comput. Graph. 15(5), 759\u2013776 (2009)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"issue":"6","key":"17_CR24","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/TVCG.2010.209","volume":"16","author":"S Diehl","year":"2010","unstructured":"Diehl, S., Beck, F., Burch, M.: Uncovering strengths and weaknesses of radial visualizations\u2013an empirical approach. IEEE Trans. Vis. Comput. Graph. 16(6), 935\u2013942 (2010)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"unstructured":"Brewer, C., Harrower, M.: The Pennsylvania State University. Colorbrewer 2.0 - color advice for cartography. http:\/\/colorbrewer2.org","key":"17_CR25"},{"doi-asserted-by":"crossref","unstructured":"Varga, A., Hornig, R.: An overview of the omnet++ simulation environment. In: International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (Simutools), pp. 1\u201310. ICST (2008)","key":"17_CR26","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23829-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:26:17Z","timestamp":1748687177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23829-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238289","9783319238296"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23829-6_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}