International Journal of Computer Applications
As in wireless network there is necessity of nodes cooperation to transfer packets from one node to another this property makes it vulnerable to wide range of attacks at different layer. Wormhole attack is one of the most destructive severe attack in which malicious node captures the traffic at particular location and tunnels it to another part of tunnel that is far away. In network security is generally equated by strong and feasible authentication and adopting methods of encryption and decryption. However, this attack is hardly defeated as they do not use any additional effort to deploy nor create any extra packets.