Research Article

Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

Table 1

Layer-wise threats.

LayerThreats

PhysicalJamming, tampering
Data linkCollision, exhaustion, unfairness
NetworkSinkhole, black hole, selective forwarding
TransportFlooding, false messages, desynchronization
ApplicationReliability attack, clock skewing, data aggregation distortion