- [1] Sharma N, Sharma, M., & Sharma, D. P, “A trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol”, In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 1232- 1237, IEEE, October ,2020.
- [2] Zardari, Zulfiqar Ali, "A lightweight technique for detection and prevention of wormhole attack in MANET", EAI Endorsed Transactions on Scalable Information Systems, 2021.
- [3] Mani G, "Reliable Wormhole Detection System Based Secure Routing and Authentication for Environmental Monitoring", Journal of Green Engineering 10 , 734-749, 2020.
- [4] Adhikary, Kaushik, "Hybrid algorithm to detect DDoS attacks in VANETs", Wireless Personal Communications , 114 , 3613-3634, 2020.
- [5] Akwirry, Brian, et "A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications.", Sensors 22.21, 8285 , 2022.
- [6] Rullo, Antonino, "Optimal placement of security resources for the Internet of Things", The Internet of Things for Smart Urban Eco systems , 95-124,
- [7] Ali Shahjahan, Parma Nand, and Shailesh Tiwari , "Detection of wormhole attack in vehicular ad-hoc network over real map using machine learning approach with preventive scheme", Journal of Information Technology Management , 14, no. Security and Resource Management challenges for Internet of Things , pp. 159-179, 2022.
- [8] Secil Ercan, Marwane Ayaida, and Nadhir Messai, "Misbehavior detection for position falsification attacks in VANETs using machine learning", IEEE Access, 10 , pages:1893-1904, 2021.
- [9] Masoud Abdan and Seyed Amin Hosseini Seno, “Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad-Hoc Network (MANET)”, Wireless Communications and Mobile Computing, pp. 1-12,
- Kuldeep Narayan Tripathi, C. Sharma, “A trust- based model (TBM) to detect rogue nodes in vehicular ad hoc networks (VANETS)”, Int J Syst Assur Eng Management, 11(2), pp. 426–440, 2019.
- SreeDivya, VeeramalluBobba, Ramesh Vatambeti, “An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication”, Wireless Personal Communications, 127, 1717–1736, 2021.
- Gaurav Soni, Arjun Rajput, “An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET”, Contemporary Issues in Communication, Cloud and Big Data Analytics, Vol. 281, pp. 57–65,
- Ankit Kumar a, Vijayakumar Varadarajan, “Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm “, Microprocessors and Microsystems, Vol. 80, 103352,
- Parma Nand and Shailesh Tiwari, “Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach “, Int. Vehicle Information and Communication Systems, Vol. 5, No. 3, pp. 354-373, 2020.
- Vasiliy Krundyshev, “Artificial swarm algorithm for VANET protection against routing attacks “, IEEE,
- Kaur, D. Kaur, and R. Mahajan, “Simulation based comparative study of routing protocols under wormhole attack in manet,” Wireless Personal Communications, vol. 96, pp. 47–63, 2017.
- Ting-Hui Chu, Shu-Yu Kuo, Yao-HsinChou , “Using Quantum-inspired Tabu Search Algorithm with Logic Operation and Moving Average Indicator for Wormhole Attack Detection in a WSN”, Journal of Internet Technology, 20, 2019.
- Kaur, Sanjay Batish& Arvind Kakaria, “An Approach to Detect the Wormhole Attack in Vehicular Ad hoc Networks “, IJSSAN, 2012
- Ratnasih , “Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper“, JURNAL INFOTEL,
- [20] Ravula Prathap Kumar, MunisamyShanmugam , “A Detailed Case Study on VANET Security Requirements, Attacks and Challenges”, Advances in Modelling and Analysis B, Vol. 62, No. 2-4,December , 48-52, 2019.
- [21] PrathapKumar , D. Murli Krishna Reddy ,G.Parimala,S. Deva Kuma, “IMPACTS OF WORMHOLE AND BLACK HOLE ATTACKS IN VANETS”, Design Engineering, ISSN: 0011-9342, Issue: 7, pp. 2128- 2146, 2021.
- Xiao Luo, Yanru Chen, Miao Li, Qian Luo, Kang Xue, Shijia Liu, Liangyin Chen. "CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack" , IEEE Access, 2019.
- Basant Subba, Santosh Biswas , Sushanta Karmakar “A game theory based multi layered intrusion detection framework for VANET”, Elsevier , 12-28, 2018.
- Ankit Kumar, Vijayakumar, “Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm ”,, Elsevier, 0141-9331, 2021.
- Muhammad Arifa, Guojun Wanga,“A survey on security attacks in VANETs: Communication, applications and challenges“, ,Elsevier, 2214-2096,
- Ratnasih , Doan Perdana “Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper”, JURNAL INFOTEL, ISSN: 2085-3688,
- Shivaprasad More, Rahul Ganpatrao Son kamble, Uday Kumar Naik, Shraddha Phansalkar, “Secured Communication in Vehicular Ad hoc Networks (VANETs) using Block chain” ICCRDA, 2020.
- Ankit Kumar, Madhavi Sinha “Design and development of new framework for detection and mitigation of wormhole and blackhole attacks in VANET”, Journal of Statistics and Management Systems, ISSN: 0972-0510, 2019.
- Heena Khanna, Manmohan Sharma, “An Improved Security Algorithm for VANET using Machine Learning”, Journal of Positive School Psychology 6, No.3, pp. 7743 – 7756, 2022.
- Gaurav Soni, Kamlesh Chandravanshi, “An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET”,
- Shahjahan Ali, Parma Nand, Shailesh Tiwari, “Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme”, Journal of Information Technology Management, 2008-5893,
- Arun Singh Kaurav, Sushama Rani Dutta, “Detection and prevention from different attacks in VANET: A Survey”, Journal of Physics: Conference Series,
- Krishna K, , & Reddy K, G. , “VANET Vulnerabilities Classification and Countermeasures: A Review ”, Majlesi Journal of Electrical Engineering
, 16(3) , 63-83, 2022.
- Hajiee, M., Fartash, M., & Osati Eraghi, , “Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network”, Majlesi Journal of Electrical Engineering, 15(4), 87-98,
|