International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Wireless sensor networks have wide range applications using different routing protocols to route the data towards the sink. However, these protocols being too simple are prone to various attacks. LEACH is a highly secure protocol with dynamic selection of cluster heads based on received signal strength. But as with other protocols, LEACH is prone to hello flood attack when the adversary becomes the cluster head and sensors being computation and energy constrained cryptographic approaches to prevent this attack are not too helpful.