1. J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Comput. Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
2. S. K. Jangir and N. Hemrajani, "A comprehensive review on detection of wormhole attack in MANET," in 2016 International Conference on ICT in Business Industry & Government (ICTBIG), 2016, pp. 1-8.
3. M. Sharma, A. Jain, and S. Shah, "Wormhole attack in mobile ad-hoc networks," in 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-4.
4. M. E.-S. Marianne Azer, Sherif El-Kassas, "A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks," Int. J. Comput. Sci. Inf. Secur., vol. 1, no. 1, pp. 41-52, 2009.
5. Y. Xu, G. Chen, J. Ford, and F. Makedon, "Detecting wormhole attacks in wireless sensor networks using connectivity information," Crit. Infrastruct. Prot., vol. 2006, 2007.