78 REFERENCES Akyildiz, I. F., et al. (2005). "Wireless mesh networks: a survey." Computer networks 47(4): 445-487. Altman, E. and T. Jimenez (2003). "NS Simulator for beginners." Lecture notes. Univ. de Los Andes, Merida, Venezuela and ESSI. Sophia-Antipolis, France. Awerbuch, B., et al. (2008). "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks." ACM Transactions on Information and System Security (TISSEC) 10(4): 6. Awerbuch, B., et al. (2002). An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st ACM workshop on Wireless security, ACM. Baras, J. S., et al. (2007). Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. Military Communications Conference, 2007. MILCOM 2007. IEEE, IEEE. Biswas, K. and M. L. Ali (2007). "Security threats in mobile ad hoc network." Department of Interaction and System Design School of Engineering, march2007: 9-26. Cayirci, E. and C. Rong (2008). Security in wireless ad hoc and sensor networks, Wiley. Chiu, H. S. and K.-S. Lui (2006). DelPHI: wormhole detection mechanism for ad hoc wireless networks. Wireless Pervasive Computing, 2006 1st International Symposium on, IEEE. Choi, S., et al. (2008). WAP: Wormhole attack prevention algorithm in mobile ad hoc networks. Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on, IEEE. Dananjayan, P., et al. "Energy Efficient and Secured Cluster Based Routing Protocol for Wireless Sensor Networks." 79 Das, R., et al. (2012). "Security Measures for Black Hole Attack in MANET: An Approach." arXiv preprint arXiv:1206.3764. Deng, H., et al. (2002). "Routing security in wireless ad hoc networks." Communications Magazine, IEEE 40(10): 70-75. Djenouri, D., et al. (2005). "A survey of security issues in mobile ad hoc networks." IEEE communications surveys 7(4). Giordano, S. (2002). "Mobile ad hoc networks." Handbook of wireless networks and mobile computing: 325-346. Gorlatova, M. A., et al. (2006). Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. Military Communications Conference, 2006. MILCOM 2006. IEEE, IEEE. Hartenstein, H. and K. P. Laberteaux (2008). "A tutorial survey on vehicular ad hoc networks." Communications Magazine, IEEE 46(6): 164-171. Hu, L. and D. Evans (2004). Using directional antennas to prevent wormhole attacks. Network and Distributed System Security Symposium (NDSS), San Diego. Hu, Y.-C., et al. (2003). "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks." Ad hoc networks 1(1): 175-192. Hu, Y.-C., et al. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, IEEE. Hu, Y.-C., et al. (2005). "Ariadne: A secure on-demand routing protocol for ad hoc networks." Wireless Networks 11(1-2): 21-38. Ilyas, M. (2010). The handbook of ad hoc wireless networks, CRC press. Jain, S. and S. Jain (2010). "Detection and prevention of wormhole attack in mobile adhoc networks." networks 1793: 8201. Jen, S.-M., et al. (2009). "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET." Sensors 9(6): 5022-5039. Kannhavong, B., et al. (2007). "A survey of routing attacks in mobile ad hoc networks." Wireless Communications, IEEE 14(5): 85-91. Karlof, C. and D. Wagner (2003). "Secure routing in wireless sensor networks: Attacks and countermeasures." Ad hoc networks 1(2): 293-315. Khalil, I., et al. (2005). LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, IEEE. 80 Khalil, I., et al. (2008). "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks." Ad hoc networks 6(3): 344-362. Marti, S., et al. (2000). Mitigating routing misbehavior in mobile ad hoc networks. International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking. Naït-Abdesselam, F. (2008). "Detecting and avoiding wormhole attacks in wireless ad hoc networks." Communications Magazine, IEEE 46(4): 127-133. Ngadi, M., et al. (2008). "A review current routing attacks in mobile ad-hoc networks." International Journal of Computer Science and Security 2(3): 18-29. Papadimitratos, P. and Z. J. Haas (2002). Secure routing for mobile ad hoc networks. Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS). Roy, D. B., et al. (2010). "A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks." arXiv preprint arXiv:1004.0587. Sanzgiri, K., et al. (2002). A secure routing protocol for ad hoc networks. Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, IEEE. Slijepcevic, S., et al. (2002). On communication security in wireless ad-hoc sensor networks. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on, IEEE. Sookhak, M., et al. (2011). "Detection Wormhole in Wireless Ad-hoc Networks." International Journal of Computer Science and telecommunication 2(7): 7. Vivian, D., et al. (2006). Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols. Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, IEEE. Wang, X. and J. Wong (2007). An end-to-end detection of wormhole attack in wireless ad-hoc networks. Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, IEEE. Wu, B., et al. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, Springer: 103-135. Yang, H., et al. (2004). "Security in mobile ad hoc networks: challenges and solutions." Wireless Communications, IEEE 11(1): 38-47.