Wireless networks, susceptible to a range of attacks due to their simplicity and ease of evasion, face a significant threat from control data attacks, notably the elusive wormhole attack. Detecting and mitigating such attacks poses challenges, particularly in the absence of a digital signature. This dissertation introduces an innovative approach that utilizes the propagation delay associated with malicious nodes’ timing characteristics for detection, employing the Ad-hoc On-Demand Distance ...