“…They can also spy on the packets going through and use the large amount of collected informat ion to break any network security. The wormho le attack [3] will also affect connectivity-based localization algorith ms and protocols based on localization, like geographic routing, will find many inconsistencies resulting in further network d isruption.…”