International Journal Of Engineering And Computer Science
The one of the most important application for gathering specific information from the surrounding environment is WSN, so it is important to safeguard the sensitive data from unauthorized access. The security level in the WSN against the attacks in susceptible due to broadcast. There are two key attacks in WSN such as compromised node and denial of service. The key attack Compromised Node (CN) attack which has the ability to create black hole, thereby interrupting the active information delivery and denial of service attack in attempt to make a network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services.