Wireless spoofing attacks are easy to work with and play an important role in the performance of a wireless sensor network. Even if a node's identity can be verified using cryptographic authentication, traditional security approaches are not always desirable due to their ground requirements. Challenging tasks in wireless sensor networks are to detect spoofing attacks, and determine the number of views to attack it, localization of multiple adversaries and eliminating them. The clustering approach is used to identify the spoofing attackers and localize them. But this approach has less accuracy in predicting the attackers. The proposed Intrusion Detection System (IDS) to detect the spoofing attackers helps in solving this problem. The cluster head act, related to IDS, is necessary to monitor the behaviour of nodes in the cluster. For example packet transmission makes it possible to determine the misbehaving nodes of the wireless sensor network. The simulation result clearly shows that the proposed scheme detects the spoofing attackers in Wireless Sensor Network efficiently and robustly. In this, the clusters are formed dynamically and periodically. A digital signature based on a specific protocol must be provided to ensure reliability and reliable data transmission for clustered wireless sensor networks. This paper includes the feasibility of the protocol in terms of security and safety during various attacks, as well as problems to solve the orphan node. The results obtained show that the proposed protocol has a better performance than existing secure protocols for a clustered wireless sensor network in terms of surface, security, and power consumption.