Main Article Content
Detection of malicious node is one of the challenges faced by the sensors in wireless sensor network. Clustered architecture is efficient one for detecting the malicious node and saves energy of the node. Sensors present in the cluster will monitor the information and send the information to cluster head by applying hamming code method. Based on the first cycle transmission, bit position will vary among the sensors. Cycle transmission and forwarding node information are stored as table called cycle table by cluster head. Cluster head will process the received information based on the cycle table. Mismatch in the table and suspicious node count, will leads to the detection of malicious node by the cluster head.