With the advancement of technology, the application of Wireless Sensor Networks (WSNs) has increased in various fields, such as; military, medical and business. WSNs have the ability to control geographic areas and obtaining data and processing it in different environments. Sensor nodes independently sample local information and if necessary send this information to neighboring sensors and eventually send it to the well. These networks are independent and autonomous and humans have no interference in it. In particular, all nodes are identical, and in practice they work together to meet the overall purpose of the network. Due to inherent constraints in the resources and computing power of sensor nodes, security in WSNs has different challenges in comparison with security in traditional computer networks. Low-cost sensor networks allow the expansion of sensor groups in a variety of environments which are capable of operating in military fields and in urban areas. On the other hand, unreliable communication channels in many applications make it more difficult to provide information security in these networks. One of the common attacks in WSNs is a wormhole attack. In this paper, we will review and evaluate paper related to the wormhole attack.