In a sinkhole attack, the adversary‟s aim is to lure nearly all the
traffic from a particular area through a compromised node,
creating a metaphorical sinkhole with the adversary at the center
[4]. Sinkhole attacks typically work by making a compromised
node look especially attractive to surrounding nodes with respect
to the routing algorithm.
Sinkhole attacks are difficult to counter because routing
information supplied by a node is difficult to verify.
As an example, a laptop-class adversary has a strong power radio
transmitter that allows it to provide a high -quality route by
transmitting with enough power to reach a wide area of the
network [4]