Open Access Open Access  Restricted Access Subscription Access

Energy conserving Detection Model for cooperative region Attacks in Wireless detector Networks

S. Gayathri


This study describes energy computation algorithmic rule wireless detector networks. The algorithmic rule is adjustable, we are able to wage counter attacks in against either single black holes or groups of malicious nodes within the detector networks. Routing data table (DRI) is employed to traumatize modification and cross checking and knowledge to spot the cooperative region nodes. AHP (Analytic Hierarchy Process): mechanism is employed to mitigate the safety problems concerning cooperative region attacks. TT (Tree topology): that helps in detection and hindrance for cooperative region attacks. Though, this mechanism works for static sensors networks and did not contemplate quality of nodes. 

Cite this Article

S. Gayathri. Energy Conserving Detection Model for Cooperative Region Attacks in Wireless Detector Networks. Journal of Network Security. 2018; 6(3): 18–22p.


Wireless detector Networks, region Attacks victimization Error Computation algorithmic rule, Security, Routing, AODV.

Full Text:



Han G, Li X, Jiang J, Shu L, Lloret J. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. The Computer Journal. 2014; 1280–1292p.

Kaur J, Kaur B. BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack. International Journal of Advance Research in Computer Science and Management Studies. 2014; 142–151p.

Ebrahim M, Chong CW. Secure force: A low-complexity cryptographic algorithm for wireless sensor network (wsn). Proc. of IEEE Int’l Conf. on Control System, Computing and Engineering (ICCSCE), 2013; 557–562p.

Fei Shi, Weijie Liu, Dongxu Jin, Jooseok Song. A cluster-based countermeasure against black hole attacks in MANET. Telecommunication Systems. 2014; 57: 119–136p.

Shilpa Mahajana, Jyoteesh Malhotrab, Sandeep Sharmac. An energy balanced QoS based cluster head selection strategy for WSN. Egyptian Informatics Journal. 2014; 189–199p.

Mohammad Wazid, Avita Katal, Roshan Singh Sachan, Goudar RH. Detection and prevention mechanism for black hole attack in wireless sensor network. Proc. of IEEE Int’l Conf. on Communication and Signal Processing. 2013; 576–581p


  • There are currently no refbacks.

Copyright (c) 2019 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517