report data. During data sharing, these WSNs become vulnerable to numerous security
threats, including the deadly ones. Mitigating this risk is a real challenge, especially in a low‐
resource environment such as a WSN. In this work, using a systematic literature review, we
surveyed a large body of research (28 studies) that focused on mitigating wormhole security
attacks. Through this study, we evaluate the impact of many proposed security schemes and …