Paper Title
Comparison Of Different Attacks On Leach Protocol In WSN

Abstract
Wireless sensor networks consists of large number of small, low cost and energy dependent sensors which are deployed to monitor many physical parameters such as temperature, pressure, vibration, motion etc. Several protocols are employed in WSN in order to reduce the amount of energy consumed. One such protocol is the hierarchical protocol called LEACH. The nature of LEACH protocol is prone to attacks. In this paper comparison of two such attacks namely Blackhole and Sinkhole on the LEACH protocol is performed and the simulated results are shown.