
Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack, attackers create a direct link, referred to as a wormhole tunnel, between them. Wormhole tunnels can be occurring by means of a wired link, a high quality wireless out-of-band link or a logical link via packet encapsulation. After building a wormhole tunnel, one attacker receives and copies packets from its neighbors, and forwards them to the other colluding attacker through the wormhole tunnel. However they need special hardware to support such communication. In this paper, we propose an efficient method to detect, secure and avoid wormhole attacks. We have introduce a special packet with name WADP packet that when a node suspect to a wormhole attack, sends it for his cluster head and to own cluster head too. Each node that receive WADP packet updates his routing table by dropping wormhole route from his table. Finally all nodes on the network receives WADP packet and drops malicious nodes information's from his routing tables.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
