Data Security in Wireless Sensor Network
In this model the base station has complete monitoring the node. Using color change the behavior of the node is done. If the base station suspect that there is change in behavior of node then encryption is changed .So that once the node is compromised within a time of second using encryption change the key is changed .So the hacker is unable to hack the information even though the node is compromised. Thorough analysis and extensive simulations support our findings. With this Security and Confidentiality solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN). Likewise the each node is monitor by cluster head which the key information is already stored in each cluster. Because of the distribute architecture and cluster type topology, it consume low energy and better security.