{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:08Z","timestamp":1767340268459},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117220"},{"type":"electronic","value":"9783642117237"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11723-7_14","type":"book-chapter","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T13:30:55Z","timestamp":1264167055000},"page":"208-223","source":"Crossref","is-referenced-by-count":8,"title":["Distributed Detection of Wormhole Attacks in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Rennie","family":"de Graaf","sequence":"first","affiliation":[]},{"given":"Islam","family":"Hegazy","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Horton","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/PERCOM.2005.38","volume-title":"3rd IEEE International Conference on Pervasive Computing and Communications","author":"A. Patwardhan","year":"2005","unstructured":"Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: 3rd IEEE International Conference on Pervasive Computing and Communications, pp. 191\u2013199. IEEE Press, Los Alamitos (2005)"},{"key":"14_CR2","first-page":"8","volume-title":"20th International Parallel and Distributed Processing Symposium","author":"B. Yu","year":"2006","unstructured":"Yu, B., Xiao, B.: Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In: 20th International Parallel and Distributed Processing Symposium, pp. 8\u201315. IEEE Press, Los Alamitos (2006)"},{"key":"14_CR3","first-page":"3383","volume-title":"IEEE International Conference on Communications","author":"E.C.H. Ngai","year":"2006","unstructured":"Ngai, E.C.H., Lie, J., Lyu, M.R.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: IEEE International Conference on Communications, pp. 3383\u20133389. IEEE Press, Los Alamitos (2006)"},{"key":"14_CR4","first-page":"75","volume-title":"14th IEEE International Conference on Network Protocols","author":"J. Eriksson","year":"2006","unstructured":"Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. In: 14th IEEE International Conference on Network Protocols, pp. 75\u201384. IEEE Press, Los Alamitos (2006)"},{"key":"14_CR5","unstructured":"Hill, J.: A Software Architecture Supporting Networked Sensors. Master\u2019s thesis, Dept. of Electrical Eng. and Computer Science. University of California at Berkeley (2000)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczky, R., Woo, A., Hollar, S., Vuller, D., Pister, K.: System Architecture Directions for Networked Sensors. In: 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 93\u2013104 (2000)","DOI":"10.1145\/378993.379006"},{"key":"14_CR7","unstructured":"Ioannis, K., Dimitriou, T., Freiling, F.C.: Towards Intrusion Detection in Wireless Sensor Networks. In: 13th European Wireless Conference (2007)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-77871-4_14","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"I. Krontiris","year":"2008","unstructured":"Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kuty\u0142owski, M., Cicho\u0144, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol.\u00a04837, pp. 150\u2013161. Springer, Heidelberg (2008)"},{"key":"14_CR9","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"3rd International Symposium on Information Processing in Sensor Networks","author":"J. Newsome","year":"2004","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: 3rd International Symposium on Information Processing in Sensor Networks, pp. 259\u2013268. ACM, New York (2004)"},{"key":"14_CR10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1023646.1023657","volume-title":"ACM Workshop on Wireless Security","author":"W. Wang","year":"2004","unstructured":"Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: ACM Workshop on Wireless Security, pp. 51\u201360. ACM, New York (2004)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/11601494_11","volume-title":"2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks","author":"L. Buttyn","year":"2005","unstructured":"Buttyn, L., Dora, L., Vajda, I.: Statistical Wormhole Detection in Sensor Networks. In: 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, pp. 128\u2013141. Springer, Berlin (2005)"},{"key":"14_CR12","first-page":"1976","volume-title":"22nd Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976\u20131986. IEEE Press, Los Alamitos (2003)"},{"key":"14_CR13","first-page":"612","volume-title":"International Conference on Dependable Systems and Networks","author":"I. Khalil","year":"2005","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: International Conference on Dependable Systems and Networks, pp. 612\u2013621. IEEE Computer Society, Washington (2005)"},{"key":"14_CR14","first-page":"107","volume-title":"26th IEEE International Conference on Computer Communications","author":"R. Maheshwari","year":"2007","unstructured":"Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: 26th IEEE International Conference on Computer Communications, pp. 107\u2013115. IEEE Press, Anchorage (2007)"},{"key":"14_CR15","unstructured":"The network simulator, http:\/\/www.isi.edu\/nsnam\/ns"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11723-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T17:36:33Z","timestamp":1634751393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11723-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117220","9783642117237"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11723-7_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}