Research Article

Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

Table 3

Comparison of normal and threat operation in LEACH protocol.

Cluster head (CH) (BS)

LEACH normal operation77677465706270630291

Coordinated sinkhole attack06706505906200

Sinkhole attack on
CH 8
0677465696169600212