Wormhole Attack. This attack is performed by a number of colluding adversaries that forward packets between them through a direct long-distance and low-latency communication link (wormhole link). With this attack, legitimate sensors at a specific area of the network believe that they are close neighbors with sensors of another area that is however far away. This illusion creates confusion and affects routing within the network.
Ok now countermeasure :
depend on scheme for round-trip time (RTT) between an originating sensor and its destination. RTT depends on how far the intermediate sensors are located. If a wormhole attack is in progress, RTT can significantly increase, as packets are replicated in a different part of the network from colluding attackers. and another a localized scheme based on connectivity graphs is proposed. It seeks for forbidden substructures in the connectivity graphs that should not be present under normal circumstances. also there will be a propose a distributed detection algorithm that detects wormhole attacks based on the distortions these attacks create in the network. This scheme uses a hop counting technique as a probe procedure, reconstructing local maps for each sensor, and then a diameter feature that depends on the number of neighboring nodes, for anomaly detection.