Research Article

Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

Table 2

Simulation setup.

Sensor nodes36
Agent nodes1
Base station1
Transmission range100 m
Transmission power100 mW
Frame retries 0
ArrangementUniform