This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes by ensuring the intensity of the transmission is scrutinized to discover the compromised node in the network.
Scarcity of security, increase in sneaking of information over a network. Wireless sensor network consists of hundreds to thousands of sensors deployed in hostile environment. As these networks are not presided over by any supervision, the security to the network is one of the elementary aspects. Due to lack of security, the nodes tend to get compromised by the adversaries. These nodes tend to attract the data towards itself and either modifies the data or denies forwarding it. This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes. The intensity of the transmission is scrutinized to discover the compromised node in the network. The detector in the cluster joins hands in scrutinizing the network. Based on these findings, encryption keys are generated. This approach secures nodes from Sybil attack by 34%, Wormhole attack by 27.8% and Sinkhole attack by 29.8%.