Date Added: Jan 2012
Wireless Sensor Networks can be implementing with compromised nodes communication. In compromised nodes to launch DDoS attacks. Using DDoS attacks characteristics to identify the authorized user's communication process. All authorized users reports of information can be available in server. Legitimate reports verify the client's communication reports. In previous system there is no specification of strong filtering scheme representation process. Present system introduces hash chain specification process with dynamic wireless sensor networks. Every port contains individual hash function. Hash Function can be allocating each and every node itself.