Sensors embedded in wireless mesh nexus calls for widely acclaimed area of research, due to its framework and internal components that integrate and work in synchronization mainly for perception of information. Being the backbone potential to various fields and applications, like critical infrastructure, disaster recovery situations, object and inventory tracking, health and medical setup, wireless sensor network has caught the attention of intruders to extract the information or disrupt its transmission. Sensor nodes are geographically aligned in mesh architecture, doing the needful. This paper revolves around the well-known “Black Hole Attack” by probing its behavior in depth and also detecting it in view of various parameters. The put forth technique focuses on energy consumption model primarily and different energy parameter values are recorded under the Invasion-case and Non-invasion case. The simulation and experimental results hence forth prove the presence of malignant attacker.
WSN, Blackhole, Packet, Energy consumption, Attack, Data, Sensor Nodes, Send, Receive, Forward, Drop, Secutrity, Malicious