“…Based on this information, each node finds the locations of some affected regions caused by wormholes and stop forwarding packets which came from those regions to isolate the wormhole (Nasipuri et al, 2001;Pirzada and McDonald, 2004). The distribution wormhole detection algorithm can be further classified into two approaches, namely, non-routing neighboring monitoring based approach (Huang and Lee, 2003) where each node monitors the topology structure of its neighbors (Wang et al, 2010;Maheshwari et al, 2007), or the inputs and outputs data flows (Khalil et al, 2005;2008) and routing receiver monitoring based approach where a data packet is monitored by the nodes in its routine. The typical distributed approaches are packet leashes (Hu et al, 2003;, TESLA with Instant Key-disclosure (Perrig et al, 2000) and mutual authentication with distancebounding (Liu et al, 2005;Du et al, 2006).…”