As the MANET applications show rapid growth in a wireless sensor network. A recent development in hardware platform shows the popularity of miniaturized devices, computational power, and large connectivity. Generally, Wireless sensor network nodes are stricken by different attacks during the transmission of messages such as HELLO flood attack and Wormhole attack which causes unsystematic behavior of the nodes. This malicious behavior creates incorrect traffic and the network may experience redundancy and topology problems. The existing system is not efficient due to the lacking of flow, error control, and reliability. The survey paper gives a better solution to achieve flexible bandwidth, energy resource complications for recent communication protocols by finding malicious node. The node that produces any one of the following attacks is called a malicious node. The analysis of nodes is done under various environments such as indoor, outdoor models in rural and urban areas concerning the ISM Band which was allocated by FCC.