Detecting wormhole attacks in wireless networks | IEEE Conference Publication | IEEE Xplore