{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:47:59Z","timestamp":1772502479512,"version":"3.50.1"},"reference-count":203,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topological area for more flexibility and accurate results.<\/jats:p>","DOI":"10.1515\/comp-2022-0245","type":"journal-article","created":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T18:40:23Z","timestamp":1660416023000},"page":"260-288","source":"Crossref","is-referenced-by-count":13,"title":["Wormhole attack detection techniques in ad-hoc network: A systematic review"],"prefix":"10.1515","volume":"12","author":[{"given":"Chitvan","family":"Gupta","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Dr. A.P.J. Abdul Kalam Technical University , Lucknow , U.P. , India"},{"name":"G.L. Bajaj Institute of Technology and Management , Greater Noida , India"}]},{"given":"Laxman","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Electronics and Comm., Noida Institute of Engineering & Technology , Greater Noida , U.P. , India"}]},{"given":"Rajdev","family":"Tiwari","sequence":"additional","affiliation":[{"name":"CEEKH Edunix Pvt. Ltd. , Noida , Uttar Pradesh , India"}]}],"member":"374","published-online":{"date-parts":[[2022,8,12]]},"reference":[{"key":"2022081707553223453_j_comp-2022-0245_ref_001","unstructured":"N. Song, L. Qian, and X. Li, \u201cWormhole attacks detection in wireless ad hoc networks: A statistical analysis approach,\u201d In: 19th IEEE International Parallel and Distributed Processing Symposium, Denver, 2005, p. 8."},{"key":"2022081707553223453_j_comp-2022-0245_ref_002","doi-asserted-by":"crossref","unstructured":"M. Masoud, Y. Jaradat, A. Manasrah, and I. Jannoud, \u201cSensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts,\u201d J. Sens., vol. 2019, p. 26, 2019.","DOI":"10.1155\/2019\/6514520"},{"key":"2022081707553223453_j_comp-2022-0245_ref_003","doi-asserted-by":"crossref","unstructured":"X. Liu, Z. Li, P. Yang, and Y. Dong, \u201cInformation-centric mobile ad hoc networks and content routing: A survey,\u201d Ad Hoc Netw., vol. 58, pp. 255\u2013268, 2017.","DOI":"10.1016\/j.adhoc.2016.04.005"},{"key":"2022081707553223453_j_comp-2022-0245_ref_004","doi-asserted-by":"crossref","unstructured":"H. Kim, M. Bae, W. Lee, and H. Kim, \u201cAdaptive decision of wireless access network for higher user satisfaction,\u201d Wirel. Commun. Mob. Comput., vol. 2018, p. 19, 2018.","DOI":"10.1155\/2018\/3427238"},{"key":"2022081707553223453_j_comp-2022-0245_ref_005","doi-asserted-by":"crossref","unstructured":"F. A. Khan, M. Imran, H. Abbas, and M. H. Durad, \u201cA detection and prevention system against collaborative attacks in mobile ad hoc networks,\u201d Future Gener. Computer Syst., vol. 68, pp. 416\u2013427, 2017.","DOI":"10.1016\/j.future.2016.07.010"},{"key":"2022081707553223453_j_comp-2022-0245_ref_006","doi-asserted-by":"crossref","unstructured":"M. Tareq, R. Alsaqour, M. Abdelhaq, and M. Uddin, \u201cMobile ad hoc network energy cost algorithm based on artificial bee colony,\u201d Wirel. Commun. Mob. Comput., vol. 2017, p. 14, 2017.","DOI":"10.1155\/2017\/4519357"},{"key":"2022081707553223453_j_comp-2022-0245_ref_007","doi-asserted-by":"crossref","unstructured":"M. Fleury, D. Kanellopoulos, and N. N. Qadri, \u201cVideo streaming over MANETs: An overview of techniques,\u201d Multimed. Tools Appl., vol. 78, pp. 23749\u201323782, 2019.","DOI":"10.1007\/s11042-019-7679-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_008","doi-asserted-by":"crossref","unstructured":"S. S. Anjum, R. Md Noor, and M. H. Anisi, \u201cReview on MANET based communication for search and rescue operations,\u201d Wirel. Personal. Commun., vol. 94, pp. 31\u201352, 2017.","DOI":"10.1007\/s11277-015-3155-y"},{"key":"2022081707553223453_j_comp-2022-0245_ref_009","doi-asserted-by":"crossref","unstructured":"X. Lei and S. H. Rhee, \u201cPerformance enhancement of overlapping BSSs via dynamic transmit power control,\u201d J. Wirel. Com. Netw., vol. 2015, p. 8, 2015.","DOI":"10.1186\/s13638-014-0232-y"},{"key":"2022081707553223453_j_comp-2022-0245_ref_010","doi-asserted-by":"crossref","unstructured":"G. Khanna, S. K. Chaturvedi, and S. Soh, \u201cReliability evaluation of mobile ad hoc networks by considering link expiration time and border time,\u201d Int. J. Syst. Assur. Eng. Manag., vol. 10, pp. 399\u2013415, 2019.","DOI":"10.1007\/s13198-019-00795-9"},{"key":"2022081707553223453_j_comp-2022-0245_ref_011","doi-asserted-by":"crossref","unstructured":"V. Yazidi, U. C. Kozat, and M. O. Sunay, \u201cA new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management,\u201d IEEE Commun. Mag., vol. ,52, pp. 76\u201385, 2014.","DOI":"10.1109\/MCOM.2014.6957146"},{"key":"2022081707553223453_j_comp-2022-0245_ref_012","doi-asserted-by":"crossref","unstructured":"X. Wang and J. Li, \u201cImproving the network lifetime of MANET through cooperative mac protocol design,\u201d IEEE Trans. Parallel Distrib. Syst., vol. 26, pp. 1010\u20131020, 2015.","DOI":"10.1109\/TPDS.2013.110"},{"key":"2022081707553223453_j_comp-2022-0245_ref_013","doi-asserted-by":"crossref","unstructured":"C. F. Huang, Y. F. Chan, and R. H. Hwang, \u201cA comprehensive real-time traffic map for geographic routing in VANET,\u201d Appl. Sci., vol. 7, p. 129, 2017.","DOI":"10.3390\/app7020129"},{"key":"2022081707553223453_j_comp-2022-0245_ref_014","doi-asserted-by":"crossref","unstructured":"A. Khan and M. H. Rehmani, \u201cReisslein, cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms and networking protocols,\u201d IEEE Commun. Surv. Tutor., vol. 18, pp. 860\u2013898, 2016.","DOI":"10.1109\/COMST.2015.2481722"},{"key":"2022081707553223453_j_comp-2022-0245_ref_015","doi-asserted-by":"crossref","unstructured":"X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, \u201cWireless networks with RF energy harvesting: A contemporary survey,\u201d IEEE Commun. Surv. Tutor., vol. 17, pp. 757\u2013789, 2015.","DOI":"10.1109\/COMST.2014.2368999"},{"key":"2022081707553223453_j_comp-2022-0245_ref_016","doi-asserted-by":"crossref","unstructured":"M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, \u201cDevice-to-device communication in 5G cellular networks: Challenges, solutions, and future directions,\u201d IEEE Commun. Mag., vol. 52, pp. 86\u201392, 2014.","DOI":"10.1109\/MCOM.2014.6815897"},{"key":"2022081707553223453_j_comp-2022-0245_ref_017","doi-asserted-by":"crossref","unstructured":"F. Qamar, K. B. Dimyati, M. N. Hindia, K. A. Noordin, M. B. Mazid, and A. M. Al-Samman, \u201cA comprehensive review on coordinated multi-point operation for LTE-A Computer,\u201d Network, vol. 123, pp. 19\u201337, 2017.","DOI":"10.1016\/j.comnet.2017.05.003"},{"key":"2022081707553223453_j_comp-2022-0245_ref_018","doi-asserted-by":"crossref","unstructured":"R. H. Jhaveri and N. M. Patel, \u201cAttack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks,\u201d Int. J. Commun. Syst., vol. 30, no. 7. p. e3148, 2017.","DOI":"10.1002\/dac.3148"},{"key":"2022081707553223453_j_comp-2022-0245_ref_019","doi-asserted-by":"crossref","unstructured":"M. Wang and Z. Yan, \u201cA survey on security in D2D communications,\u201d Mob. Netw. Appl., vol. 22, no. 2. pp. 195\u20132008, 2017.","DOI":"10.1007\/s11036-016-0741-5"},{"key":"2022081707553223453_j_comp-2022-0245_ref_020","doi-asserted-by":"crossref","unstructured":"M. S. Pathan, N. Zhu, J. He, Z. A. Zardari, M. Q. Memon, and M. I. Hussain, \u201cAn efficient trust-based scheme for secure and quality of service routing in MANETs,\u201d Future Internet, vol. 10, no. 2. p. 16, 2018.","DOI":"10.3390\/fi10020016"},{"key":"2022081707553223453_j_comp-2022-0245_ref_021","doi-asserted-by":"crossref","unstructured":"A. J. Goldsmith and S. B. Wicker, \u201cDesign challenges for energy-constrained ad hoc wireless networks,\u201d Wirel. Communications, IEEE, vol. 9, pp. 8\u201327, 2002.","DOI":"10.1109\/MWC.2002.1028874"},{"key":"2022081707553223453_j_comp-2022-0245_ref_022","unstructured":"A. Raheem and H. Ali, Security Issues in Mobile Ad-Hoc Network & Solutions, Network Security, Munich, GRIN Verlag, 2011. https:\/\/www.grin.com\/document\/200703."},{"key":"2022081707553223453_j_comp-2022-0245_ref_023","doi-asserted-by":"crossref","unstructured":"N. Sultana and S. S. Sarangdevat, \u201cThe goal of securing mobile ad-hoc network and solutions. communications in computer and information science,\u201d book: Adv. Digital Image Process. Inf. Technol., vol. 2015, pp. 355\u2013365, 2011.","DOI":"10.1007\/978-3-642-24055-3_36"},{"key":"2022081707553223453_j_comp-2022-0245_ref_024","doi-asserted-by":"crossref","unstructured":"S. Zhang, S. Wang, H. Xia, and X. Cheng, \u201cAn attack-resistant reputation management system for mobile ad hoc networks,\u201d Proc. Computer Sci., vol. 147, pp. 473\u2013479, 2019.","DOI":"10.1016\/j.procs.2019.01.275"},{"key":"2022081707553223453_j_comp-2022-0245_ref_025","unstructured":"T. Lin, S. F. Midkiff, and J. S. Park, \u201cA dynamic topology switch for the emulation of wireless mobile ad hoc networks,\u201d 27th Annual IEEE Conference on Local Computer Networks, 2002."},{"key":"2022081707553223453_j_comp-2022-0245_ref_026","doi-asserted-by":"crossref","unstructured":"K. Sindhanaiselvan, J. M. Mannan, and S. K. Aruna, \u201cDesigning a dynamic topology (DHT) for cluster head selection in mobile adhoc network,\u201d Mob. Netw. Application, vol. 25, pp. 576\u2013584, 2020.","DOI":"10.1007\/s11036-019-01283-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_027","doi-asserted-by":"crossref","unstructured":"B. Krishna Tripathy, S. K. Jena, P. Bera, and S. Das, \u201cAn adaptive secure and efficient routing protocol for mobile ad hoc networks,\u201d Wireless Personal Communications, vol. 114, no. 2, pp. 1339\u20131370, 2020.","DOI":"10.1007\/s11277-020-07423-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_028","doi-asserted-by":"crossref","unstructured":"J. Zhou, L. Liu, and H. Tan, \u201cTraffic-predictive QoS on-demand routing for multi-channel mobile ad hoc networks,\u201d J. Wirel. Commun. Netw., vol. 2018, p. 266, 2018.","DOI":"10.1186\/s13638-018-1274-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_029","doi-asserted-by":"crossref","unstructured":"K. G. Preetha, A. Unnikrishnan, and P. Jacob, \u201cImpact of bandwidth on multiple connections in AODV routing protocol for mobile ad-hoc network,\u201d Second International Conference on Computer Science, Engineering and Applications, Proceedings published by Springer, 167, Berlin, Heidelberg, 2012.","DOI":"10.1007\/978-3-642-30111-7_22"},{"key":"2022081707553223453_j_comp-2022-0245_ref_030","unstructured":"F. Sato, and S. Iijima, \u201cBattery and power aware routing in mobile ad hoc networks,\u201d Network-Based Information Systems. NBiS Lecture Notes in Computer Science, T. Enokido, L. Barolli, M. Takizawa, (eds), 4658, Berlin, Heidelberg, Springer, 2007."},{"key":"2022081707553223453_j_comp-2022-0245_ref_031","doi-asserted-by":"crossref","unstructured":"N. L. Pradhan and T. Saadawi, \u201cPower control algorithms for mobile ad hoc networks,\u201d J. Adv. Res., vol. 2, no. 3. pp. 199\u2013206, 2011.","DOI":"10.1016\/j.jare.2011.04.009"},{"key":"2022081707553223453_j_comp-2022-0245_ref_032","doi-asserted-by":"crossref","unstructured":"M. Rulnick, and N. Bambos, \u201cMobile power management for wireless communication networks,\u201d Wirel. Netw., vol. 3, pp. 3\u201314, 1997.","DOI":"10.1023\/A:1019168125436"},{"key":"2022081707553223453_j_comp-2022-0245_ref_033","doi-asserted-by":"crossref","unstructured":"N. K. Ray and A. K. Turuk, \u201cA hybrid energy efficient protocol for mobile ad hoc networks,\u201d J. Computer Netw. Commun., vol. 2016, p. 11, 2016.","DOI":"10.1155\/2016\/2861904"},{"key":"2022081707553223453_j_comp-2022-0245_ref_034","doi-asserted-by":"crossref","unstructured":"M. Anand and T. Sasikala, \u201cEfficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol,\u201d Clust. Comput., vol. 22, pp. 12681\u201312687, 2019.","DOI":"10.1007\/s10586-018-1721-2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_035","doi-asserted-by":"crossref","unstructured":"M. Elhoseny and K. Shankar, \u201cReliable data transmission model for mobile ad hoc network using signcryption technique,\u201d IEEE Trans. Reliab., vol. 69, no. 3. pp. 1077\u20131086, 2020.","DOI":"10.1109\/TR.2019.2915800"},{"key":"2022081707553223453_j_comp-2022-0245_ref_036","doi-asserted-by":"crossref","unstructured":"M. Faisal, S. Abbas, and H. Rahman, \u201cIdentity attack detection system for 802.11-based ad hoc networks,\u201d J. Wirel. Com. Netw., vol. 2018, p. 128, 2018.","DOI":"10.1186\/s13638-018-1143-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_037","doi-asserted-by":"crossref","unstructured":"Q. Wang, H. N. Dai, and Q. Zhao, \u201cEavesdropping security in wireless ad hoc networks with directional antennas,\u201d 2nd Wireless and Optical Communication Conference, 5, Chongqing, China, 2013, p. 18.","DOI":"10.1109\/WOCC.2013.6676462"},{"key":"2022081707553223453_j_comp-2022-0245_ref_038","doi-asserted-by":"crossref","unstructured":"J. Kao and R. Marculescu, \u201cEavesdropping minimization via transmission power control in ad-hoc wireless networks,\u201d3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, 2006, pp. 707\u2013714.","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"2022081707553223453_j_comp-2022-0245_ref_039","doi-asserted-by":"crossref","unstructured":"S. Sarika, A. Pravin, A. Vijayakumar, and K. Selvamani, \u201cSecurity issues in mobile ad hoc networks,\u201d Procedia Computer Sci, vol. 92, pp. 329\u2013335, 2016.","DOI":"10.1016\/j.procs.2016.07.363"},{"key":"2022081707553223453_j_comp-2022-0245_ref_040","doi-asserted-by":"crossref","unstructured":"H. Seno, S. A. Budiarto, and T. C. Wan, \u201cA secure mobile ad hoc network based on distributed certificate authority,\u201d Arab. J. Sci. Eng., vol. 36, pp. 245\u2013257, 2011.","DOI":"10.1007\/s13369-010-0018-4"},{"key":"2022081707553223453_j_comp-2022-0245_ref_041","unstructured":"Security in Ad Hoc Networks, Ad Hoc Networking Towards Seamless Communications. Signals and Communication Technology, Dordrecht, Springer, 2006."},{"key":"2022081707553223453_j_comp-2022-0245_ref_042","doi-asserted-by":"crossref","unstructured":"E. Fazeldehkordi, I. S. Amiri, and O. K. Akanbi, \u201cChapter 2 - Literature Review, A Study of Black Hole Attack Solutions,\u201d Syngress, vol. 2016, pp. 7\u201357, 2016.","DOI":"10.1016\/B978-0-12-805367-6.00002-8"},{"key":"2022081707553223453_j_comp-2022-0245_ref_043","doi-asserted-by":"crossref","unstructured":"S. Aluvala, K. Raja Sekhar, and D. Vodnala, \u201cA novel technique for node authentication in mobile ad hoc networks,\u201d Perspect. Sci., vol. 8, pp. 680\u2013682, 2016.","DOI":"10.1016\/j.pisc.2016.06.057"},{"key":"2022081707553223453_j_comp-2022-0245_ref_044","doi-asserted-by":"crossref","unstructured":"R. Kumar, Y. Shiv, V. Kumar, and M. Wairiya, \u201cAn authentication technique in mobile ad hoc network using elliptic curve cryptography,\u201d 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2018, 14-15. Noida.","DOI":"10.1109\/CONFLUENCE.2018.8442504"},{"key":"2022081707553223453_j_comp-2022-0245_ref_045","doi-asserted-by":"crossref","unstructured":"N. Ebrahimi Majid, N. Ho, T. Nguyen, and J. Stolmeier, \u201cEvaluation of parameters affecting the performance of routing protocols in mobile ad hoc networks (MANETs) with a focus on energy efficiency,\u201d Lecture Notes in Networks and Systems, Advances in Information and Communication, FICC, 2019.","DOI":"10.1007\/978-3-030-12385-7_85"},{"key":"2022081707553223453_j_comp-2022-0245_ref_046","doi-asserted-by":"crossref","unstructured":"N. Gupta and R. Gupta, \u201cOptimization of performance metrics of LAR in ad-hoc network,\u201d Int. J. Wirel. & Mob. Netw., vol. 2012, p. 4, 2012.","DOI":"10.5121\/ijwmn.2012.4306"},{"key":"2022081707553223453_j_comp-2022-0245_ref_047","doi-asserted-by":"crossref","unstructured":"D. A. Migov, and V. Shakhov, \u201cReliability of ad hoc networks with imperfect nodes,\u201d Multiple Access Communications, MACOM, 8715, 2014. Computer Science, 2014.","DOI":"10.1007\/978-3-319-10262-7_5"},{"key":"2022081707553223453_j_comp-2022-0245_ref_048","doi-asserted-by":"crossref","unstructured":"C. Rezende, A. Boukerche, R. W. Pazzi, B. P. S. Rocha, and A. A. F. Loureiro, \u201cThe impact of mobility on Mobile Ad Hoc Networks through the perspective of complex networks,\u201d J. Parallel Distrib. Comput., vol. 71, no. 9. pp. 1189\u20131200, 2011.","DOI":"10.1016\/j.jpdc.2010.12.009"},{"key":"2022081707553223453_j_comp-2022-0245_ref_049","doi-asserted-by":"crossref","unstructured":"I. Banerjee, M. Warnier, and F. M. T. Brazier, \u201cSelf-organizing topology for energy-efficient ad-hoc communication networks of mobile devices,\u201d Complex. Adapt. Syst. Model., vol. 8, p. 7, 2020.","DOI":"10.1186\/s40294-020-00073-7"},{"key":"2022081707553223453_j_comp-2022-0245_ref_050","doi-asserted-by":"crossref","unstructured":"O. Al Farraj, A. Al Zubi, and A. Tolba, \u201cTrust-based neighbor selection using activation function for secure routing in wireless sensor networks,\u201d J. Ambient. Intell. Humanized Comput., vol. 33, no. 8, 2018.","DOI":"10.1007\/s12652-018-0885-1"},{"key":"2022081707553223453_j_comp-2022-0245_ref_051","doi-asserted-by":"crossref","unstructured":"S. Hasdemir, S. Yilmaz, and S. Sen, \u201cA novel multi-featured metric for adaptive routing in mobile ad hoc networks,\u201d Appl. Intell., vol. 49, pp. 2823\u20132841, 2019.","DOI":"10.1007\/s10489-018-01401-4"},{"key":"2022081707553223453_j_comp-2022-0245_ref_052","doi-asserted-by":"crossref","unstructured":"B. K. Tripathy, S. K. Jena, and P. Bera, \u201cAn adaptive secure and efficient routing protocol for mobile ad hoc networks,\u201d Wirel. Personal. Commun., vol. 114, pp. 1339\u20131370, 2020.","DOI":"10.1007\/s11277-020-07423-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_053","doi-asserted-by":"crossref","unstructured":"B. K. Tripathy, S. K. Jena, and P. Bera, \u201cAn adaptive secure and efficient routing protocol for mobile ad hoc networks,\u201d Wirel. Pers. Commun., vol. 114, pp. 1339\u20131370, 2020.","DOI":"10.1007\/s11277-020-07423-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_054","doi-asserted-by":"crossref","unstructured":"R. J. Cai, W. C. Tan, and P. H. J. Chong, \u201cAn overview of trust-based routing design under adversarial mobile ad hoc network environment,\u201d Wirel. Personal. Commun., vol. 96, pp. 3923\u20133946, 2017.","DOI":"10.1007\/s11277-017-4359-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_055","doi-asserted-by":"crossref","unstructured":"H. Yih-Chun, A. Perrig, and D. B. Johnson, \u201cWormhole attacks in wireless networks,\u201d IEEE J. Sel. Areas Commun., vol. 24, pp. 370\u2013380, 2006.","DOI":"10.1109\/JSAC.2005.861394"},{"key":"2022081707553223453_j_comp-2022-0245_ref_056","doi-asserted-by":"crossref","unstructured":"F. Cai, C. Yongquan, H. Lansheng, and F. Zhicun, \u201cProjection pursuit based wormhole detection in ad hoc network,\u201d IEEE 10th International Conference on High Performance Computing and Communications & IEEE International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, 2013, pp. 1315-1322.","DOI":"10.1109\/HPCC.and.EUC.2013.187"},{"key":"2022081707553223453_j_comp-2022-0245_ref_057","doi-asserted-by":"crossref","unstructured":"M. Abu Zant and A. Yasin, \u201cAvoiding and isolating flooding attack by enhancing AODV MANET protocol,\u201d Hindawi, Security Commun. Netw., vol. 2019, Article ID 8249108, 2019.","DOI":"10.1155\/2019\/8249108"},{"key":"2022081707553223453_j_comp-2022-0245_ref_058","doi-asserted-by":"crossref","unstructured":"M. Khari, \u201cMobile ad hoc netwoks security attacks and secured routing protocols: A survey,\u201d Advances in Computer Science and Information Technology, Networks and Communications, vol. 84, pp. 119\u2013124, 2012.","DOI":"10.1007\/978-3-642-27299-8_14"},{"key":"2022081707553223453_j_comp-2022-0245_ref_059","doi-asserted-by":"crossref","unstructured":"A. Yasin and M. Abu Zant, \u201cDetecting and isolating black-hole attacks in MANET using timer based baited technique,\u201d Wirel. Commun. Mob. Comput., vol. 2018, Article ID 9812135, 2018.","DOI":"10.1155\/2018\/9812135"},{"key":"2022081707553223453_j_comp-2022-0245_ref_060","doi-asserted-by":"crossref","unstructured":"P. Mohammadi and A. Ghaffari, \u201cDefending against flooding attacks in mobile ad-hoc networks based on statistical analysis,\u201d Wirel. Pers. Commu, vol. 106, pp. 365\u2013376, 2019.","DOI":"10.1007\/s11277-019-06166-8"},{"key":"2022081707553223453_j_comp-2022-0245_ref_061","doi-asserted-by":"crossref","unstructured":"L. Guaya-Delgado, E. Pallar\u00e8s-Segarra, A. M. Mezher, and J. Forn\u00e9, \u201cA novel dynamic reputation-based source routing protocol for mobile ad hoc networks,\u201d J. Wirel. Com. Netw., vol. 77, 2019. 10.1186\/s13638-019-1375-7.","DOI":"10.1186\/s13638-019-1375-7"},{"key":"2022081707553223453_j_comp-2022-0245_ref_062","doi-asserted-by":"crossref","unstructured":"M. Tripathi, M. S. Gaur, and V. Laxmi, \u201cComparing the impact of black hole and gray hole attack on LEACH in WSN,\u201d Procedia Computer Sci., vol. 19, pp. 1101\u20131107, 2013.","DOI":"10.1016\/j.procs.2013.06.155"},{"key":"2022081707553223453_j_comp-2022-0245_ref_063","doi-asserted-by":"crossref","unstructured":"P. Tyagi and D. Dembla, \u201c A secured routing algorithm against black hole attack for better intelligent transportation system in vehicular ad hoc network,\u201d Int. J. Inf. Tecnol., vol. 11, pp. 743\u2013749, 2019.","DOI":"10.1007\/s41870-018-0160-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_064","doi-asserted-by":"crossref","unstructured":"A. Dorri, \u201cAn EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET,\u201d Wirel. Netw., vol. 23, pp. 1767\u20131778, 2017.","DOI":"10.1007\/s11276-016-1251-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_065","doi-asserted-by":"crossref","unstructured":"D. Mehetre, S. Roslin, and S. Wagh, \u201cDetection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust,\u201d Clust. Comput., vol. 22, p. 1313, 2018.","DOI":"10.1007\/s10586-017-1622-9"},{"key":"2022081707553223453_j_comp-2022-0245_ref_066","doi-asserted-by":"crossref","unstructured":"M. Mohanapriya and I. Krishnamurthi, \u201cModified DSR protocol for detection and removal of selective black hole attack in MANET,\u201d Computes Electr. Eng., vol. 40, pp. 530\u2013538, 2014.","DOI":"10.1016\/j.compeleceng.2013.06.001"},{"key":"2022081707553223453_j_comp-2022-0245_ref_067","doi-asserted-by":"crossref","unstructured":"A. Baadache and A. Belmehdi, \u201cStruggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks,\u201d Computer Netw., vol. 73, pp. 173\u2013184, 2014.","DOI":"10.1016\/j.comnet.2014.07.016"},{"key":"2022081707553223453_j_comp-2022-0245_ref_068","doi-asserted-by":"crossref","unstructured":"M. Mohanapriya and I. Krishnamurthi, \u201cModifed DSR protocol for detection and removal of selective black hole attack in MANET,\u201d Computers Electr. Eng., vol. 40, pp. 530\u2013538, 2014.","DOI":"10.1016\/j.compeleceng.2013.06.001"},{"key":"2022081707553223453_j_comp-2022-0245_ref_069","doi-asserted-by":"crossref","unstructured":"T. Poongodi and M. Karthikeyan, \u201cLocalized secure routing architecture against cooperative black hole attack in mobile ad hoc networks,\u201d Wirel. Personal. Commun., vol. 90, pp. 1039\u20131050, 2016.","DOI":"10.1007\/s11277-016-3318-5"},{"key":"2022081707553223453_j_comp-2022-0245_ref_070","doi-asserted-by":"crossref","unstructured":"P. Gupta, P. Goel, P. Varshney, and N. Tyagi, \u201cReliability factor based AODV protocol: prevention of black hole attack in MANET,\u201d In book: Proceedings of the International Conference on Advanced Intelligent Systems, 2019.","DOI":"10.1007\/978-981-13-2414-7_26"},{"key":"2022081707553223453_j_comp-2022-0245_ref_071","doi-asserted-by":"crossref","unstructured":"D. Airehrour, J. A. Guti\u00e9rrez, and S. K. Ray, \u201cSecuring RPL routing protocol from blackhole attacks using a trust-based mechanism,\u201d 26th International Telecommunication Networks and Applications Conference (ITNAC), 2016, pp. 115-120.","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"2022081707553223453_j_comp-2022-0245_ref_072","doi-asserted-by":"crossref","unstructured":"T. Kavitha, K. Geetha, and R. Muthaiah, \u201cIndia: Intruder node detection and isolation action in mobile ad hoc networks using feature optimization and classification approach,\u201d J. Med. Syst., vol. 43, p. 179, 2019.","DOI":"10.1007\/s10916-019-1309-2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_073","doi-asserted-by":"crossref","unstructured":"S. Gurung and S. Chauhan, \u201cPerformance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET,\u201d Wirel. Netw., vol. 25, p. 3, 2019.","DOI":"10.1007\/s11276-017-1639-2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_074","doi-asserted-by":"crossref","unstructured":"S. Gurung and S. Chauhan, \u201cA novel approach for mitigating gray hole attack in MANET,\u201d Wirel. Netw., vol. 24, pp. 565\u2013579, 2018.","DOI":"10.1007\/s11276-016-1353-5"},{"key":"2022081707553223453_j_comp-2022-0245_ref_075","doi-asserted-by":"crossref","unstructured":"N. Schweitzer, A. Stulman, R. D. Margalit, and A. Shabtai, \u201cContradiction based gray-hole attack minimization for ad-hoc networks,\u201d IEEE Trans. Mob. Comput., vol. 16, pp. 2174\u20132183, 2017.","DOI":"10.1109\/TMC.2016.2622707"},{"key":"2022081707553223453_j_comp-2022-0245_ref_076","doi-asserted-by":"crossref","unstructured":"A. Vasudeva and M. Sood, \u201cSurvey on Sybil attack defence mechanisms in wireless ad hoc networks,\u201d J. Netw. Computer Appl., vol. 120, pp. 78\u2013118, 2018.","DOI":"10.1016\/j.jnca.2018.07.006"},{"key":"2022081707553223453_j_comp-2022-0245_ref_077","doi-asserted-by":"crossref","unstructured":"H. Rajadurai and U. D. Gandhi, \u201cFuzzy based collaborative verification system for Sybil attack detection in MANET,\u201d Wirel. Pers. Commun., vol. 110, pp. 2179\u20132193, 2020.","DOI":"10.1007\/s11277-019-06836-7"},{"key":"2022081707553223453_j_comp-2022-0245_ref_078","doi-asserted-by":"crossref","unstructured":"R. Shyamala, and S. Valli, \u201cImpact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks,\u201d Advances in Computing and Information Technology, 176, Berlin, Heidelberg, Springer, 2012.","DOI":"10.1007\/978-3-642-31513-8_36"},{"key":"2022081707553223453_j_comp-2022-0245_ref_079","doi-asserted-by":"crossref","unstructured":"K. G. Reddy, and P. S. Thilagam, \u201cIntrusion detection technique for wormhole and following jellyfish and byzantine attacks in wireless mesh network,\u201d Advanced Computing, Networking and Security, 7135, Berlin, Heidelberg, Springer, 2012.","DOI":"10.1007\/978-3-642-29280-4_73"},{"key":"2022081707553223453_j_comp-2022-0245_ref_080","doi-asserted-by":"crossref","unstructured":"J. Liu, H. Chen, Z. Zhen, and M. Sha, \u201cIntrusion detection algorithm for the wormhole attack in ad hoc network,\u201d Proceedings of International Conference on Computer Science and Information Technology, Advances in Intelligent Systems and Computing, 2014, p. 255.","DOI":"10.1007\/978-81-322-1759-6_18"},{"key":"2022081707553223453_j_comp-2022-0245_ref_081","doi-asserted-by":"crossref","unstructured":"J. Li, D. Wang, and Y. Wang, \u201cSecurity DV-hop localisation algorithm against wormhole attack in wireless sensor network,\u201d IET Wirel. Sens. Syst., vol. 8, no. 2. pp. 68\u201375, 2018.","DOI":"10.1049\/iet-wss.2017.0075"},{"key":"2022081707553223453_j_comp-2022-0245_ref_082","doi-asserted-by":"crossref","unstructured":"R. Sivakami and G. M. Kadhar Nawaz, \u201cA radical block to byzantine attacks in mobile ad hoc networks,\u201d Wirel. Pers. Commun., vol. 87, pp. 485\u2013497, 2016.","DOI":"10.1007\/s11277-015-3079-6"},{"key":"2022081707553223453_j_comp-2022-0245_ref_083","doi-asserted-by":"crossref","unstructured":"M. Selvan and S. Selvakumar, \u201cMalicious node identification using quantitative intrusion detection techniques in MANET,\u201d Clust. Comput., vol. 22, pp. 1\u20139, 2019.","DOI":"10.1007\/s10586-018-2418-2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_084","unstructured":"M. Ebenezarjebarani and B. P. Kumar, \u201cA novel security authentication analysis onMANETs networks,\u201d J. Crit. Rev., vol. 7, pp. 2765\u20132770, 2020."},{"key":"2022081707553223453_j_comp-2022-0245_ref_085","doi-asserted-by":"crossref","unstructured":"Islam, Noman, Security Issues in Mobile Ad Hoc Network, Book: Wireless Networks and Security, Signals and Communication Technology, Chapter: Security Issues in Mobile Ad hoc Network Publisher, Springer, 2013.","DOI":"10.1007\/978-3-642-36169-2_2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_086","unstructured":"M. Hauspie, D. Simplot, J. Carle, Partition detection in mobile ad-hoc networks, ad-hoc network, Mahdia, Tunisia, 2003, p. 6."},{"key":"2022081707553223453_j_comp-2022-0245_ref_087","doi-asserted-by":"crossref","unstructured":"B. Bhushan and G. Sahoo, \u201cRecent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks,\u201d Wirel. Personal. Commun., vol. 98, pp. 2037\u20132077, 2018.","DOI":"10.1007\/s11277-017-4962-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_088","doi-asserted-by":"crossref","unstructured":"P. Cong, S. Lim, J. Chae, and B. Jung, \u201cActive detection in mitigating routing misbehaviour for MANETs,\u201d Wirel. Netw., vol. 25, no. 4. pp. 1669\u20131683, 2019.","DOI":"10.1007\/s11276-017-1621-z"},{"key":"2022081707553223453_j_comp-2022-0245_ref_089","doi-asserted-by":"crossref","unstructured":"F. A. Khan, M. Imran, H. Abbas, and M. Durad, \u201cA detection and prevention system against collaborative attacks in mobile ad hoc networks,\u201d Future Gener. Computer Syst., vol. 68, pp. 416\u2013427, 2017.","DOI":"10.1016\/j.future.2016.07.010"},{"key":"2022081707553223453_j_comp-2022-0245_ref_090","doi-asserted-by":"crossref","unstructured":"S. K. Das, and S. Tripathi, \u201cEnergy efficient routing formation algorithm for hybrid adhoc network: A geometric programming approach,\u201d Peer-to-Peer Networking and Applications, vol. 12, no. 1. pp. 102\u2013128, 2019. 10.1007\/s12083-018-0643-3.","DOI":"10.1007\/s12083-018-0643-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_091","doi-asserted-by":"crossref","unstructured":"H. C. Chen, \u201cTCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks,\u201d IEEE Syst. J., vol. 11, no. 2. pp. 449\u2013459, 2017.","DOI":"10.1109\/JSYST.2015.2437285"},{"key":"2022081707553223453_j_comp-2022-0245_ref_092","unstructured":"B. Wu, J. Chen, J. Wu, and M. Cardei, \u201cA survey of attacks and countermeasures in mobile ad hoc networks,\u201d Wireless Network Security, Signals and Communication Technology, Y. Xiao, X. S. Shen, D. Z. Du, (eds), Boston, MA, Springer, 2007."},{"key":"2022081707553223453_j_comp-2022-0245_ref_093","unstructured":"K. Karthigadevi, S. Balamurali, and M. Venkatesulu, \u201cWormhole attack detection and prevention using EIGRP protocol based on round trip time,\u201d J. Cyber Secur. Mobil., vol. 7, pp. 215\u2013228, 2002."},{"key":"2022081707553223453_j_comp-2022-0245_ref_094","doi-asserted-by":"crossref","unstructured":"M. K. Garg, Singh, and P. Verma, Fuzzy rule-based approach for design and analysis of a Trust-based Secure Routing Protocol for MANETs, Procedia Computer Science, vol. 132, pp. 653\u2013658, 2018. 10.1016\/j.procs.2018.05.064.","DOI":"10.1016\/j.procs.2018.05.064"},{"key":"2022081707553223453_j_comp-2022-0245_ref_095","doi-asserted-by":"crossref","unstructured":"K. Gomathi, B. Parvathavarthini, and C. Saravanakumar, \u201cAn efficient secure group communication in MANET using fuzzy trust based clustering and hierarchical distributed group key management,\u201d Wirel. Personal. Commun., vol. 94, pp. 2149\u20132162, 2017.","DOI":"10.1007\/s11277-016-3366-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_096","doi-asserted-by":"crossref","unstructured":"A. Baadache and A. Belmehdi, \u201cFighting against packet dropping misbehaviour in multi-hop wireless ad hoc networks,\u201d J. Netw. Computer Appl., vol. 35, pp. 1130\u20131139, 2012.","DOI":"10.1016\/j.jnca.2011.12.012"},{"key":"2022081707553223453_j_comp-2022-0245_ref_097","doi-asserted-by":"crossref","unstructured":"G. Wu, X. Chen, L. Yao, Y. Lee, and K. Yim, \u201cAn efficient wormhole attack detection method in wireless sensor networks,\u201d Computer Sci. Inf. Syst., vol. 11, no. 3. pp. 1127\u20131141, 2014.","DOI":"10.2298\/CSIS130921068W"},{"key":"2022081707553223453_j_comp-2022-0245_ref_098","doi-asserted-by":"crossref","unstructured":"H. N. Jha, S. Gupta, and D. Maity, \u201cEffect of wormhole attacks on MANET,\u201d book: Des. Framew. Wirel. Netw., vol. 82, pp. 177\u2013195, 2020.","DOI":"10.1007\/978-981-13-9574-1_8"},{"key":"2022081707553223453_j_comp-2022-0245_ref_099","doi-asserted-by":"crossref","unstructured":"R. Matam and S. Tripathy, \u201cDefence against wormhole attacks in wireless mesh networks,\u201d Lecture Notes Computer Sci, vol. 7671, pp. 181\u2013193, 2012.","DOI":"10.1007\/978-3-642-35130-3_13"},{"key":"2022081707553223453_j_comp-2022-0245_ref_100","doi-asserted-by":"crossref","unstructured":"M. Meghdadi, S. Ozdemir, and I. G\u00fcler, \u201cA survey of wormhole-based attacks and their countermeasures in wireless sensor networks,\u201d Proceeding of the IETE Technical Review, Taylor & Francis, vol. 28, pp. 89\u2013102, 2011.","DOI":"10.4103\/0256-4602.78089"},{"key":"2022081707553223453_j_comp-2022-0245_ref_101","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Lou, Z. Wang, J. Wu, Z. Wang, and A. Xia, \u201cSecuring DV-Hop localization against wormhole attacks in wireless sensor networks,\u201d Pervasive Mob. Comput., vol. 16, pp. 22\u201335, 2015.","DOI":"10.1016\/j.pmcj.2014.01.007"},{"key":"2022081707553223453_j_comp-2022-0245_ref_102","doi-asserted-by":"crossref","unstructured":"E. A. Panaousis, L. Nazaryan, and C. Politis, \u201cSecuring AODV against wormhole attacks in emergency MANET,\u201d Multimed. Commun., vol. 2009, pp. 7\u20139, 2009.","DOI":"10.4108\/ICST.MOBIMEDIA2009.7292"},{"key":"2022081707553223453_j_comp-2022-0245_ref_103","doi-asserted-by":"crossref","unstructured":"R. Singh, J. Singh, and R. Singh, \u201cWRHT: A hybrid technique for detection of wormhole attack in wireless sensor networks,\u201d Mob. Inf. Syst., vol. 2016, Article ID 8354930, 13 pages, 2016.","DOI":"10.1155\/2016\/8354930"},{"key":"2022081707553223453_j_comp-2022-0245_ref_104","doi-asserted-by":"crossref","unstructured":"R. A. Prakash, W. S. Jeyaseelan, and T. Jayasankar, \u201cDetection, prevention and mitigation of wormhole attack in wireless adhoc network by coordinator,\u201d Appl. Math., vol. 12, no. 1. pp. 233\u2013237, 2018.","DOI":"10.18576\/amis\/120123"},{"key":"2022081707553223453_j_comp-2022-0245_ref_105","doi-asserted-by":"crossref","unstructured":"M. Khabbazian, H. Mercier, and V. K. Bhargava, \u201cSeverity analysis and countermeasure for the wormhole attack in wireless adhoc networks,\u201d IEEE Trans. Wirel. Commun., vol. 8, no. 2. pp. 736\u2013745, 2009.","DOI":"10.1109\/TWC.2009.070536"},{"key":"2022081707553223453_j_comp-2022-0245_ref_106","unstructured":"D. Sarkar, S. Choudhury, and A. Majumder, \u201cEnhanced-Ant-AODV for optimal route selection in mobile ad-hoc network,\u201d J. King Saud. University, Computer Inf. Sci., vol. 32, pp. 1\u201325, 2018."},{"key":"2022081707553223453_j_comp-2022-0245_ref_107","doi-asserted-by":"crossref","unstructured":"B. Tian, Q. Li, Y. X. Yang, D. Li, and Y. Xin, \u201cA ranging based scheme for detecting the wormhole attack in wireless sensor networks,\u201d J. China Universities Posts Telecommun., vol. 19, pp. 6\u201310, 2012.","DOI":"10.1016\/S1005-8885(11)60478-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_108","doi-asserted-by":"crossref","unstructured":"R. Matam and S. Tripathy, \u201cWRSR: wormhole-resistant secure routing for wireless mesh networks,\u201d J. Wirel. Com. Netw., vol. 180, 2013. 10.1186\/1687-1499-2013-180.","DOI":"10.1186\/1687-1499-2013-180"},{"key":"2022081707553223453_j_comp-2022-0245_ref_109","doi-asserted-by":"crossref","unstructured":"F. Shi, W. Liu, D. Jin, and J. Song, \u201cA countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology,\u201d Electron Commerce Research, vol. 13, pp. 329\u2013345, Springer, 2013. 10.1007\/s10660-013-9122-3.","DOI":"10.1007\/s10660-013-9122-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_110","unstructured":"B. Wu, J. Chen, J. Wu, and M. Cardei, \u201cA survey of attacks and countermeasures in mobile ad hoc networks,\u201d Wireless Network Security, Springer, Signals and Communication Technology, 2007. 10.1007\/978-0-387-33112-6_5."},{"key":"2022081707553223453_j_comp-2022-0245_ref_111","doi-asserted-by":"crossref","unstructured":"A. S. Mhd. Nurul and K. Ferens, \u201cA computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks,\u201d Adv. Science, Technol. Eng. Syst. J., vol. 2, no. 3. pp. 302\u2013320, 2017.","DOI":"10.25046\/aj020340"},{"key":"2022081707553223453_j_comp-2022-0245_ref_112","doi-asserted-by":"crossref","unstructured":"J. Karlsson, L. S. Dooley, and G. Pulkkis, \u201cA new MANET wormhole detection algorithm based on traversal time and hop count analysis,\u201d Sensors, vol. 11, pp. 11122\u201311140, 2011.","DOI":"10.3390\/s111211122"},{"key":"2022081707553223453_j_comp-2022-0245_ref_113","doi-asserted-by":"crossref","unstructured":"F. Shi, W. Liu, D. Jin, and J. Song, \u201cA countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology,\u201d Electron. Commer. Res., vol. 13, pp. 329\u2013345, 2013.","DOI":"10.1007\/s10660-013-9122-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_114","doi-asserted-by":"crossref","unstructured":"J. Karlsson, L. S. Dooley, and G. Pulkkis, \u201cIdentifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm,\u201d Sensors, vol. 13, p. 5, 2013.","DOI":"10.3390\/s130506651"},{"key":"2022081707553223453_j_comp-2022-0245_ref_115","doi-asserted-by":"crossref","unstructured":"Z. A. Khan, and M. H. Islam, \u201cWormhole attack: A new detection technique,\u201d Proceedings International Conference on Emerging Technologies, ICET, 2012, 1-6.","DOI":"10.1109\/ICET.2012.6375443"},{"key":"2022081707553223453_j_comp-2022-0245_ref_116","doi-asserted-by":"crossref","unstructured":"P. Sharma, and R. K. Dwivedi, \u201cDetection of high transmission power based wormhole attack using received signal strength indicator (RSSI),\u201d First International Conference, CNC, Gwalior, India, March 2018, pp. 22-24.","DOI":"10.1007\/978-981-13-2372-0_13"},{"key":"2022081707553223453_j_comp-2022-0245_ref_117","unstructured":"S. U. Qazi, Contributions to securing mobile ad hoc networks against wormhole attacks n multirate transmission, Doctor of Philosophy thesis, School of Computer Science and Software Engineering, University of Wollongong, 2016."},{"key":"2022081707553223453_j_comp-2022-0245_ref_118","doi-asserted-by":"crossref","unstructured":"S. Hazra, and S. K. Setua, \u201cTrust oriented secured AODV routing protocol against rushing attack,\u201d Advances in Intelligent Systems and Computing, vol. 176, Berlin, Heidelberg, Springer, 2012. 10.1007\/978-3-642-31513-8_79.","DOI":"10.1007\/978-3-642-31513-8_79"},{"key":"2022081707553223453_j_comp-2022-0245_ref_119","doi-asserted-by":"crossref","unstructured":"P. Amish and V. B. Vaghela, \u201cDetection and prevention of wormhole attack in wireless sensor network using AOMDV protocol,\u201d Procedia Computer Sci, vol. 79, pp. 700\u2013707, 2016.","DOI":"10.1016\/j.procs.2016.03.092"},{"key":"2022081707553223453_j_comp-2022-0245_ref_120","doi-asserted-by":"crossref","unstructured":"G. Liu, Z. Yan, and W. Pedrycz, \u201cData collection for attack detection and security measurement in mobile ad hoc networks: A survey,\u201d J. Netw. Computer Appl., vol. 105, pp. 105\u2013122, 2018.","DOI":"10.1016\/j.jnca.2018.01.004"},{"key":"2022081707553223453_j_comp-2022-0245_ref_121","doi-asserted-by":"crossref","unstructured":"M. Imran, F. A. Khan, T. Jamal, and M. H. Durad, \u201cAnalysis of detection features for wormhole attacks in MANETs,\u201d Procedia Computer Science, Elsevier, vol. 56, pp. 384\u2013390, 2015.","DOI":"10.1016\/j.procs.2015.07.224"},{"key":"2022081707553223453_j_comp-2022-0245_ref_122","doi-asserted-by":"crossref","unstructured":"L. Lu, M. J. Hussain, G. Luo, and Z. Han, \u201cPworm: passive and real-time wormhole detection scheme for WSNs, Hindawi Publishing Corporation,\u201d Int. J. Distrib. Sens. Netw., p. 16, 2015.","DOI":"10.1155\/2015\/356382"},{"key":"2022081707553223453_j_comp-2022-0245_ref_123","doi-asserted-by":"crossref","unstructured":"N. A. Mhd, K. Shaon, and A. Ferens, \u201cComputationally intelligent approach to the detection of wormhole attacks in wireless sensor networks,\u201d Adv. Science, Technol. Eng. Syst. J., vol. 2, no. 3. pp. 302\u2013320, 2017.","DOI":"10.25046\/aj020340"},{"key":"2022081707553223453_j_comp-2022-0245_ref_124","doi-asserted-by":"crossref","unstructured":"S. M. Jen, C. S. Laih, and W. C. Kuo, \u201c A hop-count analysis scheme for avoiding wormhole attacks in MANET,\u201d Sensors, vol. 9, pp. 5022\u201339, 2009.","DOI":"10.3390\/s90605022"},{"key":"2022081707553223453_j_comp-2022-0245_ref_125","doi-asserted-by":"crossref","unstructured":"S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, and P. Kar, \u201cWormhole detection based on ordinal MDS using RTT in wireless sensor network,\u201d Hindawi Publishing Corporation Journal of Computer Networks and Communications, 2016, 15.","DOI":"10.1155\/2016\/3405264"},{"key":"2022081707553223453_j_comp-2022-0245_ref_126","doi-asserted-by":"crossref","unstructured":"E. Zamani, and M. Soltanaghaei, \u201cThe improved overhearing backup AODV protocol in MANET,\u201d Hindawi Publishing Corporation Journal of Computer Networks and Communications, 2016, 8.","DOI":"10.1155\/2016\/6463157"},{"key":"2022081707553223453_j_comp-2022-0245_ref_127","doi-asserted-by":"crossref","unstructured":"T. V. P. Sundararajan, S. M. Ramesh, R. Maheswar, and K. R. Deepak, \u201cBiologically inspired artificial intrusion detection system for detecting wormhole attack in MANET,\u201d Springer Science Business Media New York, Wireless Network, 2013.","DOI":"10.1007\/s11276-013-0623-8"},{"key":"2022081707553223453_j_comp-2022-0245_ref_128","doi-asserted-by":"crossref","unstructured":"S. Jamali, and R. Fotohi, \u201cDAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system,\u201d J Supercomput, 73, 2017, 5173-5196.","DOI":"10.1007\/s11227-017-2075-x"},{"key":"2022081707553223453_j_comp-2022-0245_ref_129","doi-asserted-by":"crossref","unstructured":"G. Farjamnia, Y. Gasimov, and C. Kazimov, \u201cReview of the techniques against the wormhole attacks on wireless sensor networks,\u201d Wireless Personal Communications, Springer Science, Business Media, 2019.","DOI":"10.1007\/s11277-019-06160-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_130","doi-asserted-by":"crossref","unstructured":"D. Sharma, V. Kumar, and R. Kumar, \u201cPrevention of wormhole attack using identity based signature scheme in MANET,\u201d Comput. Int. Data Min., pp. 475\u2013485, 2016.","DOI":"10.1007\/978-81-322-2731-1_45"},{"key":"2022081707553223453_j_comp-2022-0245_ref_131","doi-asserted-by":"crossref","unstructured":"V. Kumar and R. Kumar, \u201cAn Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET,\u201d Security Comp. & Comm., vol. 536, pp. 110\u2013112, 2015.","DOI":"10.1007\/978-3-319-22915-7_11"},{"key":"2022081707553223453_j_comp-2022-0245_ref_132","doi-asserted-by":"crossref","unstructured":"M. Sookhak, A. Akhundzada, A. Sookhak, M. Eslaminejad, A. Gani, M. Khurram Khan, et al., \u201cGeographic wormhole detection in wireless sensor networks,\u201d PLoS ONE, vol. 10, no. 1. p. e0115324, 2015.","DOI":"10.1371\/journal.pone.0115324"},{"key":"2022081707553223453_j_comp-2022-0245_ref_133","doi-asserted-by":"crossref","unstructured":"P. Lee, A. Clark, L. Bushnell, and R. Poovendran, \u201cA Passivity framework for modelling and mitigating wormhole attacks on networked control systems,\u201d IEEE Trans. Autom. Control., vol. 59, no. 12. pp. 3224\u20133237, 2014.","DOI":"10.1109\/TAC.2014.2351871"},{"key":"2022081707553223453_j_comp-2022-0245_ref_134","doi-asserted-by":"crossref","unstructured":"D. U. Kim, H. W. Kim, G. Kim, and S. A. Kim, \u201cCounterattack-detection scheme in transmission time-based wormhole detection methods,\u201d Int. J. Distrib. Sens. Netw., vol. 9, no. 3. p. 184931, 2013.","DOI":"10.1155\/2013\/184931"},{"key":"2022081707553223453_j_comp-2022-0245_ref_135","unstructured":"H. S. Chiu, and K. S. Lui, \u201cDelPHI: Wormhole detection mechanism for ad hoc wireless networks,\u201d International Symposium on Wireless Pervasive Computing ISWPC, Phuket, 2006, 6."},{"key":"2022081707553223453_j_comp-2022-0245_ref_136","doi-asserted-by":"crossref","unstructured":"T. P. Van Tran, Y. K. Le Xuan Hung, S. Lee, and H. Lee, \u201cTransmission time based mechanism to detect wormhole attack,\u201d Proceedings of the IEEE Asia-Pacific Service Computing Conference, 11\u201314, 2007, 172-178.","DOI":"10.1109\/APSCC.2007.64"},{"key":"2022081707553223453_j_comp-2022-0245_ref_137","doi-asserted-by":"crossref","unstructured":"S. M. Jen, C. S. Laih, and W. C. Kuo, \u201cA hop-count analysis scheme for avoiding wormhole attacks in MANET,\u201d Sensors, vol. 9, pp. 5022\u201339, 2009.","DOI":"10.3390\/s90605022"},{"key":"2022081707553223453_j_comp-2022-0245_ref_138","doi-asserted-by":"crossref","unstructured":"F. N. Abdesselam, B. Bensaou, and T. Taleb, \u201cDetecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks,\u201d Security In Mobile Ad Hoc and Sensor Networks, IEEE Communications Magazine, 2008.","DOI":"10.1109\/MCOM.2008.4481351"},{"key":"2022081707553223453_j_comp-2022-0245_ref_139","doi-asserted-by":"crossref","unstructured":"S. Qazi, R. Raad, Y. Mu, and W. Susilo, \u201cMultirate DelPHI to secure multirate ad hoc networks against wormhole attack,\u201d J. Inf. Security Appl., vol. 39, pp. 31\u201340, 2018.","DOI":"10.1016\/j.jisa.2018.01.005"},{"key":"2022081707553223453_j_comp-2022-0245_ref_140","doi-asserted-by":"crossref","unstructured":"C. Gupta, and P. Pathak, \u201cMovement based or neighbour-based technique for preventing wormhole attack in MANET,\u201d Symposium on Colossal Data Analysis and Networking (CDAN), Indore, India, 2016, 1-5.","DOI":"10.1109\/CDAN.2016.7570943"},{"key":"2022081707553223453_j_comp-2022-0245_ref_141","doi-asserted-by":"crossref","unstructured":"C. Lee and J. Suzuki, \u201cSWAT: A decentralized self-healing mechanism for wormhole attacks in wireless sensor networks,\u201d Handb. Sens. Netw., pp. 511\u2013532, 2010.","DOI":"10.1142\/9789812837318_0021"},{"key":"2022081707553223453_j_comp-2022-0245_ref_142","doi-asserted-by":"crossref","unstructured":"S. M. Jen, C. S. Laih, W. C. Kuo, and A. Hop-Count, \u201cAnalysis scheme for avoiding wormhole attacks in MANET,\u201d Sensors, vol. 9, pp. 5022\u20135039, 2009.","DOI":"10.3390\/s90605022"},{"key":"2022081707553223453_j_comp-2022-0245_ref_143","doi-asserted-by":"crossref","unstructured":"L. Qian, N. Song, and X. Li, \u201cDetection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach,\u201d J. Netw. Computer Appl., vol. 30, pp. 308\u2013330, 2007.","DOI":"10.1016\/j.jnca.2005.07.003"},{"key":"2022081707553223453_j_comp-2022-0245_ref_144","doi-asserted-by":"crossref","unstructured":"L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, \u201cPreventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,\u201d IEEE Conference on Wireless Communications and Networking, 2, 2005, 1193-1199.","DOI":"10.1109\/WCNC.2005.1424678"},{"key":"2022081707553223453_j_comp-2022-0245_ref_145","unstructured":"Z. Yifeng, L. Lamont, and L. Li, \u201cWormhole attack detection based on distance verification and the Use of hypothesis testing for wireless ad hoc networks,\u201d IEEE Conference on Military Communications, Boston, MA, 2009, 1-7."},{"key":"2022081707553223453_j_comp-2022-0245_ref_146","doi-asserted-by":"crossref","unstructured":"S. Capkun, L. Buttyan, and J. P. Hubaux, \u201cSector: Secure tracking of node encounters in multi-hop wireless networks,\u201d Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks (ACM SANS), 2003, 21-32.","DOI":"10.1145\/986858.986862"},{"key":"2022081707553223453_j_comp-2022-0245_ref_147","doi-asserted-by":"crossref","unstructured":"M. O. Johnson, A. Siddiqui, and A. Karami, \u201cA wormhole attack detection and prevention technique in wireless sensor networks,\u201d Int. J. Computer Appl., vol. 174, no. 4. pp. 1\u20138, 2017.","DOI":"10.5120\/ijca2017915376"},{"key":"2022081707553223453_j_comp-2022-0245_ref_148","doi-asserted-by":"crossref","unstructured":"S. Bai, Y. Liu, Z. Li, and X. Bai, \u201cDetecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures,\u201d Computer Netw, vol. 150, pp. 190\u2013200, 2019.","DOI":"10.1016\/j.comnet.2019.01.008"},{"key":"2022081707553223453_j_comp-2022-0245_ref_149","doi-asserted-by":"crossref","unstructured":"F. Barani, \u201cA hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system,\u201d Iranian Conference on Intelligent Systems, ICIS, 2014.","DOI":"10.1109\/IranianCIS.2014.6802607"},{"key":"2022081707553223453_j_comp-2022-0245_ref_150","doi-asserted-by":"crossref","unstructured":"L. E. Jim and M. A. Gregory, \u201cA review of artificial immune system based security frameworks for MANET,\u201d Int. J. Communications, Netw. Syst. Sci., vol. 9, pp. 1\u201318, 2016.","DOI":"10.4236\/ijcns.2016.91001"},{"key":"2022081707553223453_j_comp-2022-0245_ref_151","doi-asserted-by":"crossref","unstructured":"S. Jamali and R. Fotohi, \u201cDefending against wormhole attack in MANET using an artificial immune system,\u201d N. Rev. Inf. Netw., vol. 21, no. 2. pp. 79\u2013100, 2016.","DOI":"10.1080\/13614576.2016.1247741"},{"key":"2022081707553223453_j_comp-2022-0245_ref_152","doi-asserted-by":"crossref","unstructured":"S. Upadhyay, and B. K. Chaurasia, \u201cDetecting and avoiding wormhole attack in MANET using statistical analysis approach,\u201d Advances in Computer Science and Information Technology. Networks and Communications, CCSIT, 84, Springer, 2012.","DOI":"10.1007\/978-3-642-27299-8_42"},{"key":"2022081707553223453_j_comp-2022-0245_ref_153","doi-asserted-by":"crossref","unstructured":"S. Qazi, R. Raad, Y. Mu, and W. Susilo, \u201cSecuring DSR against wormhole attacks in multirate ad hoc networks,\u201d J. Netw. Computer Appl., vol. 36, no. 2, pp. 582\u2013592, 2013.","DOI":"10.1016\/j.jnca.2012.12.019"},{"key":"2022081707553223453_j_comp-2022-0245_ref_154","doi-asserted-by":"crossref","unstructured":"D. Kim, H. Kim, G. Kim, and S. Kim, \u201cA counterattack-detection scheme in transmission time-based wormhole detection methods,\u201d Hindawi Publ. Corporation, Int. J. Distrib. Sens. Netw., vol. 9, no. 3. p. 184931, 2013.","DOI":"10.1155\/2013\/184931"},{"key":"2022081707553223453_j_comp-2022-0245_ref_155","doi-asserted-by":"crossref","unstructured":"J. Karlsson, L. S. Dooley, and G. Pulkkis, \u201cIdentifying time measurement tampering in the traversal time and hop count analysis (TTHCA), wormhole detection algorithm,\u201d Sensors, vol. 13, no. 5. pp. 6651\u20136668, 2013.","DOI":"10.3390\/s130506651"},{"key":"2022081707553223453_j_comp-2022-0245_ref_156","doi-asserted-by":"crossref","unstructured":"T. Giannetsos and T. Dimitriou, \u201cLDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks,\u201d J. Computer Syst. Sci., vol. 80, no. 3. pp. 618\u2013643, 2014.","DOI":"10.1016\/j.jcss.2013.06.015"},{"key":"2022081707553223453_j_comp-2022-0245_ref_157","doi-asserted-by":"crossref","unstructured":"M. Sookhak, A. Akhundzada, A. Sookhak, M. Eslaminejad, A. Gani, M. Khurram Khan, et al., \u201cGeographic wormhole detection in wireless sensor networks,\u201d PLoS One, vol. 10, no. 1. p. e0115324, 2015.","DOI":"10.1371\/journal.pone.0115324"},{"key":"2022081707553223453_j_comp-2022-0245_ref_158","doi-asserted-by":"crossref","unstructured":"S. Ji, T. Chen, and S. Zhong, \u201cWormhole attack detection algorithms in wireless network coding systems,\u201d IEEE Trans. Mob. Comput., vol. 14, no. 3. pp. 660\u2013674, 2015.","DOI":"10.1109\/TMC.2014.2324572"},{"key":"2022081707553223453_j_comp-2022-0245_ref_159","doi-asserted-by":"crossref","unstructured":"S. Qazi, R. Raadb, Y. Mua, and W. Susiloa, \u201cMulti-rate DelPHI to secure multi-rate ad hoc networks against wormhole attacks,\u201d J. Inf. Security Appl., vol. 39, pp. 31\u201340, 2018.","DOI":"10.1016\/j.jisa.2018.01.005"},{"key":"2022081707553223453_j_comp-2022-0245_ref_160","doi-asserted-by":"crossref","unstructured":"D. S. K. Tiruvakadu and V. Pallapa, \u201cConfirmation of wormhole attack in MANETs using honeypot,\u201d Computers & Security, vol. 76, pp. 32\u201349, 2018.","DOI":"10.1016\/j.cose.2018.02.004"},{"key":"2022081707553223453_j_comp-2022-0245_ref_161","doi-asserted-by":"crossref","unstructured":"S. Sankara Narayanan, and G. Murugaboopathi, \u201cModified secure AODV protocol to prevent wormhole attack in MANET,\u201d Special Issue on Advances in Metaheuristic Optimization Algorithms (AMOA2018), willey, John Wiley & Sons Ltd, 2018.","DOI":"10.1002\/cpe.5017"},{"key":"2022081707553223453_j_comp-2022-0245_ref_162","doi-asserted-by":"crossref","unstructured":"K. Karthigadevi, S. Balamurali, and M. Venkatesulu, \u201cWormhole attack detection and prevention using EIGRP protocol based on round trip time,\u201d J. Cyber Security Mobil., vol. 7, no. 1. pp. 215\u2013228, 2018.","DOI":"10.13052\/2245-1439.7115"},{"key":"2022081707553223453_j_comp-2022-0245_ref_163","doi-asserted-by":"crossref","unstructured":"S. Bai, Y. Liu, Z. Li, and X. Bai, \u201cDetecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures,\u201d Computer Networks, IEEE Access, vol. 150, pp. 190\u2013200, 2019.","DOI":"10.1016\/j.comnet.2019.01.008"},{"key":"2022081707553223453_j_comp-2022-0245_ref_164","doi-asserted-by":"crossref","unstructured":"X. Luo, Y. Chen, M. Li, Q. Luo, K. Xue, S. Liu, et al., \u201cCREDND: A novel secure neighbour discovery algorithm for wormhole attack,\u201d IEEE Access, vol. 7, pp. 18194\u201318205, 2019.","DOI":"10.1109\/ACCESS.2019.2894637"},{"key":"2022081707553223453_j_comp-2022-0245_ref_165","doi-asserted-by":"crossref","unstructured":"W. A. Aliady and S. A. Al-Ahmadi, \u201cEnergy preserving secure measure against wormhole attack in wireless sensor networks,\u201d IEEE Access, vol. 7, pp. 84132\u201384141, 2019.","DOI":"10.1109\/ACCESS.2019.2924283"},{"key":"2022081707553223453_j_comp-2022-0245_ref_166","doi-asserted-by":"crossref","unstructured":"N. Tamilarasi, and S. G. Santhi, \u201cDetection of wormhole attack and secure path selection in wireless sensor network,\u201d Wireless Pers Commun, 114, 2020, 329-345.","DOI":"10.1007\/s11277-020-07365-4"},{"key":"2022081707553223453_j_comp-2022-0245_ref_167","doi-asserted-by":"crossref","unstructured":"M. M. Singh, N. Dutta, T. R. Singh, and U. Nandi, \u201cA technique to detect wormhole attack in wireless sensor network using artificial neural network,\u201d Evolutionary Computing and Mobile Sustainable Networks, 53, Springer, 2020.","DOI":"10.1007\/978-981-15-5258-8_29"},{"key":"2022081707553223453_j_comp-2022-0245_ref_168","doi-asserted-by":"crossref","unstructured":"P. Kaur, D. Kaur, and R. Mahajan, \u201cWormhole attack detection technique in mobile ad hoc networks,\u201d Wirel. Personal. Commun., vol. 97, pp. 2939\u20132950, 2017.","DOI":"10.1007\/s11277-017-4643-z"},{"key":"2022081707553223453_j_comp-2022-0245_ref_169","doi-asserted-by":"crossref","unstructured":"M. Xie, J. Hu, S. Han, and H. -H. Chen, \u201cScalable hypergrid KNN-based online anomaly detection in wireless sensor networks,\u201d IEEE Trans. Parallel Distrib. Syst., vol. 24, p. 8, 2013.","DOI":"10.1109\/TPDS.2012.261"},{"key":"2022081707553223453_j_comp-2022-0245_ref_170","doi-asserted-by":"crossref","unstructured":"W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, \u201cA new intrusion detection system based on KNN classification algorithm in wireless sensor network,\u201d J. Electr. Computer Eng., pp. 1\u20138, 2014.","DOI":"10.1155\/2014\/240217"},{"key":"2022081707553223453_j_comp-2022-0245_ref_171","doi-asserted-by":"crossref","unstructured":"C. Titouna, M. Aliouat, and M. Gueroui, \u201cOutlier detection approach using Bayes classifiers in wireless sensor networks,\u201d Wirel. Pers. Commun., vol. 85, pp. 1009\u20131023, 2015.","DOI":"10.1007\/s11277-015-2822-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_172","doi-asserted-by":"crossref","unstructured":"M. Wazid and A. K. Das, \u201cAn efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks,\u201d Wirel. Pers. Commun., vol. 90, pp. 1971\u20132000, 2016.","DOI":"10.1007\/s11277-016-3433-3"},{"key":"2022081707553223453_j_comp-2022-0245_ref_173","doi-asserted-by":"crossref","unstructured":"B. Subba, S. Biswas, and S. Karmakar, \u201cIntrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation,\u201d Eng. Sci. Technology, an. Int. J., vol. 19, no. 2. pp. 782\u2013799, 2016.","DOI":"10.1016\/j.jestch.2015.11.001"},{"key":"2022081707553223453_j_comp-2022-0245_ref_174","doi-asserted-by":"crossref","unstructured":"Z. Feng, J. Fu, D. Du, F. Li, and S. Sun, \u201cA new approach of anomaly detection in wireless sensor networks using support vector data description,\u201d Int. J. Distrib. Sens. Netw., vol. 13, 2017.","DOI":"10.1177\/1550147716686161"},{"key":"2022081707553223453_j_comp-2022-0245_ref_175","doi-asserted-by":"crossref","unstructured":"H. Saeedi Emadi and S. M. Mazinani, \u201cA novel anomaly detection algorithm using DBSCAN and SVM in wireless sensor networks,\u201d Wirel. Pers. Commun., vol. 98, pp. 2025\u20132035, 2018.","DOI":"10.1007\/s11277-017-4961-1"},{"key":"2022081707553223453_j_comp-2022-0245_ref_176","doi-asserted-by":"crossref","unstructured":"M. S. Khan, L. Khan, N. Gul, M. Amir, J. Kim, and S. M. Kim, \u201cSupport vector machine-based classification of malicious users in cognitive radio networks,\u201d Wirel. Commun. Mob. Comput., p. 11, 2020.","DOI":"10.1155\/2020\/8846948"},{"key":"2022081707553223453_j_comp-2022-0245_ref_177","doi-asserted-by":"crossref","unstructured":"K. G. Reddy and P. S. Thilagam, \u201cNa\u00efve Bayes classifier to mitigate the DDoS attacks severity in ad-hoc networks,\u201d Int. J. Commun. Netw. Inf. Security (IJCNIS), vol. 12, no. 2. pp. 221\u20136, 2020.","DOI":"10.17762\/ijcnis.v12i2.4574"},{"key":"2022081707553223453_j_comp-2022-0245_ref_178","doi-asserted-by":"crossref","unstructured":"S. A. Elsaid, and N. S. Albatati, \u201cAn optimized collaborative intrusion detection system for wireless sensor networks,\u201d Springer-Verlag GmbH Germany, Soft Computing, Springer Nature, 2020.","DOI":"10.1007\/s00500-020-04695-0"},{"key":"2022081707553223453_j_comp-2022-0245_ref_179","doi-asserted-by":"crossref","unstructured":"W. Zhang, D. Han, K. C. Li, and F. I. Massetto, \u201cWireless sensor network intrusion detection system based on MK-ELM,\u201d Soft Computing, Springer-Verlag GmbH Germany, Springer Nature, 2020.","DOI":"10.1007\/s00500-020-04678-1"},{"key":"2022081707553223453_j_comp-2022-0245_ref_180","doi-asserted-by":"crossref","unstructured":"K. S. Sankaran, N. Vasudevan, K. R. Devabalaji, T. S. Babu, H. H. Alhelou, and T. Yuvaraj, \u201cA recurrent reward based learning technique for secure neighbor selection in mobile ad-hoc networks,\u201d IEEE Access, vol. 9, pp. 21735\u201345, 2021.","DOI":"10.1109\/ACCESS.2021.3055422"},{"key":"2022081707553223453_j_comp-2022-0245_ref_181","doi-asserted-by":"crossref","unstructured":"R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, \u201cAnomaly-based behavioral detection in mobile ad-hoc networks,\u201d Procedia Computer Sci, vol. 159, pp. 77\u201386, 2020.","DOI":"10.1016\/j.procs.2019.09.162"},{"key":"2022081707553223453_j_comp-2022-0245_ref_182","doi-asserted-by":"crossref","unstructured":"M. Prasad, S. Tripathi, and K. Dahal, \u201cWormhole attack detection in ad hoc network using machine learning technique,\u201d 10th ICCCNT, IEEE \u2013 45670, IIT \u2013 Kanpur, 2019.","DOI":"10.1109\/ICCCNT45670.2019.8944634"},{"key":"2022081707553223453_j_comp-2022-0245_ref_183","doi-asserted-by":"crossref","unstructured":"M. Tahboush and M. Agoyi, \u201cA hybrid wormhole attack detection in mobile ad-hoc network (MANET),\u201d IEEE Access, vol. 9, pp. 11872\u201383, January 13, 2021.","DOI":"10.1109\/ACCESS.2021.3051491"},{"key":"2022081707553223453_j_comp-2022-0245_ref_184","unstructured":"J. Zhang, I. Vukotic, and R. Gardner, \u201cAnomaly detection in wide area network mesh using two machine learning anomaly detection algorithms,\u201d CoRR, Cornell university, 2018, 1801-10094."},{"key":"2022081707553223453_j_comp-2022-0245_ref_185","doi-asserted-by":"crossref","unstructured":"P. K. Singh, R. R. Gupta, S. K. Nandi, and S. Nandi, \u201cMachine learning based approach to detect wormhole attack in VANETs,\u201d Dev. Primatology: Prog. Prospect., pp. 651\u2013661, 2019.","DOI":"10.1007\/978-3-030-15035-8_63"},{"key":"2022081707553223453_j_comp-2022-0245_ref_186","doi-asserted-by":"crossref","unstructured":"M. Abdan and S. A. H. Seno, \u201cMachine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET),\u201d Wirel. Commun. Mob. Comput., p. 2375702, 2022, 10.1155\/2022\/2375702","DOI":"10.21203\/rs.3.rs-544233\/v1"},{"key":"2022081707553223453_j_comp-2022-0245_ref_187","doi-asserted-by":"crossref","unstructured":"H. Shahid, H. Ashraf, H. Javed, M. Humayun, N. Jhanjhi, and M. A. AlZain, \u201cEnergy optimised security against wormhole attack in IoT-based wireless sensor networks,\u201d Computers, Mater. Continua, vol. 68, no. 2. pp. 1967\u201381, 2021 Jan 1, 10.32604\/cmc.2021.015259.","DOI":"10.32604\/cmc.2021.015259"},{"key":"2022081707553223453_j_comp-2022-0245_ref_188","doi-asserted-by":"crossref","unstructured":"A. M. Alajlan, \u201cMulti-step detection of simplex and duplex wormhole attacks over wireless sensor networks,\u201d Computers,Materials Continua, vol. 70, no. 3. pp. 4241\u201359, 2022, 10.32604\/cmc.2022.020585.","DOI":"10.32604\/cmc.2022.020585"},{"key":"2022081707553223453_j_comp-2022-0245_ref_189","doi-asserted-by":"crossref","unstructured":"L. Singh, A. Alam, K. V. Kumar, D. Kumar, P. Kumar, and Z. A. Jaffery, \u201cDesign of thermal imaging-based health condition monitoring and early fault detection technique for porcelain insulators using Machine learning,\u201d Environ. Technol. Innov., vol. 24, p. 102000, 2021.","DOI":"10.1016\/j.eti.2021.102000"},{"key":"2022081707553223453_j_comp-2022-0245_ref_190","doi-asserted-by":"crossref","unstructured":"A. Alam, L. Singh, Z. A. Jaffery, Y. K. Verma, and M. Diwakar, \u201cDistance-based confidence generation and aggregation of classifier for unstructured road detection,\u201d Journal of King Saud University-Computer and Information Sciences, 2021.","DOI":"10.1016\/j.jksuci.2021.09.020"},{"key":"2022081707553223453_j_comp-2022-0245_ref_191","doi-asserted-by":"crossref","unstructured":"P. Das, J. K. P. S. Yadav, and L. Singh, \u201cDeep learning-based tomato\u2019s ripe and unripe classification system,\u201d Int. J. Softw. Innov., vol. 10, no. 1, 2022, 10.4018\/IJSI.292023.","DOI":"10.4018\/IJSI.292023"},{"key":"2022081707553223453_j_comp-2022-0245_ref_192","unstructured":"K. D. Rose, K. V. Kumar, L. Singh, and S. K. Sharma, \u201cComputer aided diagnosis for breast cancer detection and classification using optimal region growing segmentation and mobile net model,\u201d Concurrent Eng, 2022, 10.1177\/1063293X221080518."},{"key":"2022081707553223453_j_comp-2022-0245_ref_193","doi-asserted-by":"crossref","unstructured":"R. Boutaba, M. A. Salahuddin, N. Limam, S. Ayoubi, N. Shahriar, F. Estrada-Solano, et al., \u201cA comprehensive survey on machine learning for networking: evolution, applications and research opportunities,\u201d J. Internet Serv. Appl., vol. 9, p. 16, 2018.","DOI":"10.1186\/s13174-018-0087-2"},{"key":"2022081707553223453_j_comp-2022-0245_ref_194","doi-asserted-by":"crossref","unstructured":"M. A. Hossain, R. M. Noor, K. -L. A. Yau, S. R. Azzuhri, M. R. Z\u2019aba, and I. Ahmedy, \u201cComprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks,\u201d IEEE Access, vol. 8, pp. 78054\u201378108, 2020.","DOI":"10.1109\/ACCESS.2020.2989870"},{"key":"2022081707553223453_j_comp-2022-0245_ref_195","unstructured":"L. Hu, and D. Evans, \u201cUsing directional antennas to prevent wormhole attacks,\u201d Proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, 2004."},{"key":"2022081707553223453_j_comp-2022-0245_ref_196","doi-asserted-by":"crossref","unstructured":"R. R. Choudhury, X. Yang, N. H. Vaidya, and R. Ramanathan, \u201cUsing directional antennas for medium access control in ad-hoc networks,\u201d Proceedings of the 8th annual international conference on Mobile computing and networking, 2002, 59-70.","DOI":"10.1145\/570645.570653"},{"key":"2022081707553223453_j_comp-2022-0245_ref_197","doi-asserted-by":"crossref","unstructured":"S. Yi, Y. Pei, and S. Kalyan Raman, \u201cOn the capacity improvement of ad-hoc wireless networks using directional antennas,\u201d Proceedings of the 4th ACM international symposium on Mobile ad-hoc networking and computing, 108\u201316, 2003. New York, NY, USA, ACM Press.","DOI":"10.1145\/778415.778429"},{"key":"2022081707553223453_j_comp-2022-0245_ref_198","unstructured":"L. Singh, and A. Alam, \u201cAn efficient hybrid methodology for an early detection of breast cancer in digital mammograms,\u201d Journal of Ambient Intelligence and Humanized Computing, 1-24. 10.1007\/s12652-022-03895-w."},{"key":"2022081707553223453_j_comp-2022-0245_ref_199","doi-asserted-by":"crossref","unstructured":"M. Takai, J. Martin, R. Bagrodia, and A. Ren, \u201cDirectional virtual carrier sensing for directional antennas in mobile ad-hoc networks,\u201d Proceedings of the 3rd ACM international symposium on Mobile ad-hoc networking and computing, 2002, 183-9.","DOI":"10.1145\/513800.513823"},{"key":"2022081707553223453_j_comp-2022-0245_ref_200","doi-asserted-by":"crossref","unstructured":"S. Brands, and D. Chaum, \u201cDistance-bounding protocols,\u201d Theory and Application of Cryptographic Techniques, 1993, 344-59.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"2022081707553223453_j_comp-2022-0245_ref_201","doi-asserted-by":"crossref","unstructured":"D. Liu, P. Ning, and R. Li, \u201cEstablishing pair-wise keys in distributed sensor networks,\u201d ACM Trans. Inf. Syst. Security, vol. 8, no. 1. pp. 41\u201377, 2005.","DOI":"10.1145\/1053283.1053287"},{"key":"2022081707553223453_j_comp-2022-0245_ref_202","doi-asserted-by":"crossref","unstructured":"S. Ozdemir, Functional reputation based reliable data aggregation and transmission for wireless sensor networks, Computer Communications, vol. 31, no. 17, pp. 3941-53, 2008.","DOI":"10.1016\/j.comcom.2008.07.017"},{"key":"2022081707553223453_j_comp-2022-0245_ref_203","doi-asserted-by":"crossref","unstructured":"L. E. Jim and M. A. Gregory, \u201cA review of artificial immune system based security frame works for MANET,\u201d Int. J. Communications, Netw. Syst. Sci., vol. 9, pp. 1\u201318, 2016.","DOI":"10.4236\/ijcns.2016.91001"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0245\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0245\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T17:46:19Z","timestamp":1727804779000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0245\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":203,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2022-0245"],"URL":"https:\/\/doi.org\/10.1515\/comp-2022-0245","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}