| Abbreviation | Meaning |
| BS | Base Station |
| CH | Cluster Head |
| CH’ | Compromised Cluster Heads |
| CM | Cluster Members |
| CN | Cluster Node |
| CSMA/TDMA | Carrier Sense Multiple Access/Time Division Multiple Access |
| d | Distance |
| EI | Energy Indicator |
| IDSs | Intrusion Detection Systems |
| IR | Intrusion Ratio |
| J | Joules |
| k | Message Bits |
| LEACH | Low-Energy Adaptive Clustering Hierarchy |
| MAC | Message Authentication Code |
| MIT | Massachusetts Institute of Technology |
| N | Network Size |
| Nbrpk | Number of Packets Sent to The CH |
| NC | Number of Cluster Heads Within A Round |
| NC’ | Number of Compromised CHs [Attackers] Within A Specific Round |
| NO-DATA-PKT | Number of Data Packets Received by a CH |
| NS2 | Network Simulator Tool Version 2 |
| PDR | Packet Delivery Ratio |
| PKT | Packet |
| RPK | Random Pairwise Keys |
| RSSI | Received Signal Strength Indicator |
| S | Seconds |
| SCH | Second Cluster Head |
| SE | Software Engineering |
| SDLC | Software Development Life Cycle |
| TDMA | Time Division Multiple Access |
| WSNs | Wireless Sensor Networks |