The hierarchical routing protocols based on clusters rely fundamentally on their CHs for data aggregation and routing. They are vulnerable to several attacks, such as Hello flood, Selective forwarding, replay, etc; attacks involving CH are the most damaging. If a malicious node managed to become a CH, it can launch attacks to disrupt the network operation. Note that, the malicious node can choo...