We present a novel technique to detect an intrusive attack that occurs in the network due to the presence of a compromised node. These intrusive attacks last for a long time in the network due to the existence of compromised nodes this also affects the sensor reading. As the time span of the attack in longer in the network, it affects the system and can cause a system failure.
View Article and Find Full Text PDF