{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:30:03Z","timestamp":1773408603893,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,3]],"date-time":"2013-07-03T00:00:00Z","timestamp":1372809600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-180","type":"journal-article","created":{"date-parts":[[2013,7,3]],"date-time":"2013-07-03T02:28:45Z","timestamp":1372818525000},"source":"Crossref","is-referenced-by-count":18,"title":["WRSR: wormhole-resistant secure routing for wireless mesh networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Rakesh","family":"Matam","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,3]]},"reference":[{"issue":"4","key":"743_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz IF, Wang X, Wang W: Wireless mesh networks: a survey. J. Comput. Netw. ISDN Syst 2005, 47(4):445-487.","journal-title":"J. Comput. Netw. ISDN Syst"},{"key":"743_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/b13595","volume-title":"Book, Wireless Mesh Networks: Architectures and Protocols","author":"W Zhang","year":"2008","unstructured":"Zhang W, Wang Z, Das SK, Hassan M: Security Issues in Wireless Mesh Networks. In Book, Wireless Mesh Networks: Architectures and Protocols. Springer, New York; 2008."},{"key":"743_CR3","volume-title":"Proceedings of the 22nd IEEE International Conference on Computer Communications","author":"Y Hu","year":"2003","unstructured":"Hu Y, Perrig A, Johnson D: Packet leashes: a defence against wormhole attacks in wireless networks. In Proceedings of the 22nd IEEE International Conference on Computer Communications. IEEE, San Francisco; 30 March\u20133 April 2003."},{"key":"743_CR4","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 10: Mesh Networking","author":"IEEE P802.11s Part 11:","year":"2011","unstructured":"IEEE P802.11s Part 11:: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 10: Mesh Networking. IEEE, New York; 2011."},{"key":"743_CR5","doi-asserted-by":"crossref","unstructured":"Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H: ODSBR: an on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Security 2008., 10(4):","DOI":"10.1145\/1284680.1341892"},{"issue":"2","key":"743_CR6","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TWC.2009.070536","volume":"8","author":"M Khabbazian","year":"2009","unstructured":"Khabbazian M, Mercier H, Bhargava VK: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wireless Commun 2009, 8(2):736-745.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"743_CR7","first-page":"343","volume-title":"Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing","author":"S Choi","year":"2008","unstructured":"Choi S, Kim DY, Lee DH, Jung JI: WAP: Wormhole attack prevention algorithm in mobile ad hoc networks. In Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing. IEEE, Taichung; 11\u201313 June 2008:343-348."},{"key":"743_CR8","first-page":"39","volume-title":"Proceedings of the Thirty-First Annual International Computer Software and Applications Conference","author":"X Wang","year":"2007","unstructured":"Wang X, Wong J: An end-to-end detection of wormhole attack in wireless ad hoc networks. In Proceedings of the Thirty-First Annual International Computer Software and Applications Conference. IEEE, Beijing; 24\u201327 July 2007:39-48."},{"issue":"2","key":"743_CR9","first-page":"545","volume":"46","author":"Z Tun","year":"2008","unstructured":"Tun Z, Maw AH: Wormhole attack detection in wireless sensor networks. J. World Acad. Sci. Eng. Technol 2008, 46(2):545-550.","journal-title":"J. World Acad. Sci. Eng. Technol"},{"key":"743_CR10","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/CCNC.2007.122","volume-title":"Proceedings of Fourth IEEE Consumer Communication and Networking Conference","author":"P Tran","year":"2007","unstructured":"Tran P, Hung LX, Lee YK, Lee S, Lee H: TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In Proceedings of Fourth IEEE Consumer Communication and Networking Conference. IEEE, Las Vegas; January 2007:593-598."},{"key":"743_CR11","first-page":"704","volume-title":"Proceedings of International Conference on Information Technology: Coding and Computing","author":"T Korkmaz","year":"2005","unstructured":"Korkmaz T: Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. In Proceedings of International Conference on Information Technology: Coding and Computing. IEEE, Las Vegas; 4\u20136 April 2005:704-709."},{"key":"743_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/986858.986862","volume-title":"Proceedings of the First ACM Workshop on Security of ad hoc and Sensor Networks","author":"S Capkun","year":"2003","unstructured":"Capkun S, Buttyan L, Hubaux JP: SECTOR: Secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the First ACM Workshop on Security of ad hoc and Sensor Networks. ACM, Virginia; 31 October 2003:21-32."},{"issue":"1","key":"743_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","volume":"13","author":"R Poovendran","year":"2007","unstructured":"Poovendran R, Lazos L: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM J. Wireless Netw 2007, 13(1):27-59. 10.1007\/s11276-006-3723-x","journal-title":"ACM J. Wireless Netw"},{"key":"743_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/NAS.2010.22","volume-title":"Proceedings of IEEE Fifth International Conference on Networking, Architecture and Storage","author":"Y Wang","year":"2010","unstructured":"Wang Y, Zhang Z, Wu J: A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. In Proceedings of IEEE Fifth International Conference on Networking, Architecture and Storage. IEEE, Macau; 15\u201317 July 2010:63-72."},{"key":"743_CR15","volume-title":"Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"X Ban","year":"2011","unstructured":"Ban X, Sarkar R, Gao J: Local connectivity tests to identify wormholes in wireless networks. In Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, Paris; 16\u201320 May 2011."},{"key":"743_CR16","first-page":"1","volume-title":"Proceedings of IEEE international Symposium on Personal, Indoor and Mobile Radio Communications","author":"W Znaidi","year":"2008","unstructured":"Znaidi W, Minier M, Babau JP: Detecting wormhole attacks in wireless networks using local neighborhood information. In Proceedings of IEEE international Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, Cannes; 15\u201318 September 2008:1-5."},{"issue":"2","key":"743_CR17","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"MY Su","year":"2010","unstructured":"Su MY: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Security 2010, 29(2):208-224. 10.1016\/j.cose.2009.09.005","journal-title":"Comput. Security"},{"key":"743_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-35130-3_13","volume-title":"Proceedings of the 8th International Conference on Information Systems and Security","author":"R Matam","year":"2012","unstructured":"Matam R, Tripathy S: Defence against wormhole attacks in wireless mesh networks. In Proceedings of the 8th International Conference on Information Systems and Security. Springer LNCS, Guwahati; 15\u201319 December 2012:181-193."},{"key":"743_CR19","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/AINA.2012.81","volume-title":"Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications","author":"J Zhou","year":"2012","unstructured":"Zhou J, Cao J, Zhang J, Zhang C, Yu Y: Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed. In Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications. IEEE, Fukuoka; 26\u201329 March 2012:59-66."},{"key":"743_CR20","first-page":"73","volume-title":"Proceedings of Third International Conference on Network and System Security","author":"T Hayajneh","year":"2009","unstructured":"Hayajneh T, Krishnamurthy P, Tipper D: DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks. In Proceedings of Third International Conference on Network and System Security. IEEE, Gold Coast; 19\u201321 October 2009:73-80."},{"key":"743_CR21","volume-title":"The dynamic source routing protocol for mobile ad-hoc network (DSR), IETF internet draft","author":"DB Johnson","year":"2004","unstructured":"Johnson DB, Maltz DA, Hu YC: The dynamic source routing protocol for mobile ad-hoc network (DSR), IETF internet draft. IETF MANET Working Group, Fremont; 2004."},{"key":"743_CR22","volume-title":"Proceedings of IEEE International Conference on Network Protocols","author":"J Eriksson","year":"2007","unstructured":"Eriksson J, Faloutsos M, Krishnamurthy S: Routing amid colluding attackers. In Proceedings of IEEE International Conference on Network Protocols. IEEE, Beijing; 16\u201319 October 2007."},{"key":"743_CR23","volume-title":"Ad hoc on-demand distance vector (AODV) routing, IETF internet draft","author":"CE Perkins","year":"2004","unstructured":"Perkins CE, Royer EM, Das SR: Ad hoc on-demand distance vector (AODV) routing, IETF internet draft. IETF MANET Working Group, Fremont, California USA; 2004."},{"key":"743_CR24","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-31513-8_19","volume":"176","author":"B Swathi","year":"2012","unstructured":"Swathi B, Tripathy S, Matam R: Secure peer-link establishment in wireless mesh networks. Adv. Intell. Syst. Comput 2012, 176: 189-198. 10.1007\/978-3-642-31513-8_19","journal-title":"Adv. Intell. Syst. Comput"},{"issue":"1-3","key":"743_CR25","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/0012-365X(90)90358-O","volume":"86","author":"BN Clark","year":"1990","unstructured":"Clark BN, Colbourn CJ, Johnson DS: Unit disk graphs. Discrete Math. J 1990, 86(1-3):165-177. 10.1016\/0012-365X(90)90358-O","journal-title":"Discrete Math. J"},{"key":"743_CR26","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1145\/938985.939000","volume-title":"Proceedings of MobiCom","author":"D De Couto","year":"2003","unstructured":"De Couto D, Aguayo D, Bicket J, Morris R: A high-throughput path metric for multi-hop wireless routing. In Proceedings of MobiCom. ACM, San Diego; 14\u201319 September 2003:134-146."},{"key":"743_CR27","first-page":"114","volume-title":"Proceedings of ACM MobiCom","author":"R Draves","year":"2004","unstructured":"Draves R, Padhye J, Zill B: Routing in multi-radio multi-hop wireless mesh networks. In Proceedings of ACM MobiCom. ACM, Philadelphia; 26 September\u20131 October 2004:114-128."},{"key":"743_CR28","unstructured":"The OMNeT++ Network Simulator . Accessed 23 September 2011 http:\/\/www.omnetpp.org"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-180\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-180.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-180.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T21:07:35Z","timestamp":1688332055000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,3]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["743"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-180","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,3]]},"article-number":"180"}}