INTRODUCTIONWith the advancement in smaller scale integrated circuit technology, Wireless Sensor Networks (WSNs) have begun to assume an essential part in our every day lives. It is a direct result of the lessening in cost of the sensor nodes, prompting expanding arrangements of WSNs to a larger degree. Potential applications for wireless sensor networks exist in an assortment of fields, including mechanical process checking and control, condition and living space observing, machine wellbeing checking, home automation, human services applications, atomic reactor control, fire recognition, question following and traffic control. Effective outline and usage of wireless sensor networks have turned into a hot zone of research as of late, because of the huge limit of sensor networks to empower applications associating the physical world with the virtual world. Like living beings, an assortment of current devices and types of gear depends on the sensory information from this present reality around it. These sensory data comes is given by Wireless Sensor Networks (WSN), which includes a couple of minor sensor nodes to screen physical or natural conditions, for instance, temperature, vibration, weight, sound or development, and subsequently aggregately send these information to a central figuring structure, called the base station or sink. Diverse routing protocols administer the development of this data. Broadly the routing protocols can be named level based routing, various leveled based routing, and area based routing. Filter (Low Energy Adaptive Clustering Hierarchy) is a various leveled based routing protocol which utilizes irregular revolution of the nodes required to be the bunch heads to equitably convey energy utilization in the network. Sensor network protocols are very straightforward and consequently are exceptionally helpless to assaults like Sinkhole assault, Selective sending, Sybil assault, Wormholes, HELLO surge assault, Acknowledgment parodying, adjusting, replaying routing data. For instance, Selective sending and HELLO surge assault influences networks with grouping based protocols like LEACH.