Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although, the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The challenging tasks in wireless sensor network are identification of spoofing attackers, determination of number of attackers, localization of multiple adversaries and eliminating them. The clustering approach is used to detect the spoofing attackers and localize them. This approach fails to predict the attackers accurately.