S.Sivanantham, K.Kirankumar, G.Saravanagokul
Wireless sensor network is deployed and operated in an unattended and hostile environment to monitor events , produce and transmit data. Nodes in the sensor network could be a gateway, base station, storage node, or querying user. Because of the ease of deployment, the low cost of sensor nodes and the capability of self-organization, sensor network is often used to perform monitoring and data collection tasks. Wireless sensors networks finds its major applications in Military and defence networks. When it is deployed in such an environment, it lacks physical protection and is subject to node compromise. After compromising one or multiple sensor nodes, an adversary may launch various attacks [1] to disrupt the inter-network communication.