Research Article
Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks
Table 1
Layer-wise threats.
| Layer | Threats |
| Physical | Jamming, tampering | Data link | Collision, exhaustion, unfairness | Network | Sinkhole, black hole, selective forwarding | Transport | Flooding, false messages, desynchronization | Application | Reliability attack, clock skewing, data aggregation distortion |
|
|