Packet Droppers and Modifiers are common attacks on wireless sensor networks. It is very difficult to identify such attacks and this attack interrupts communication in wireless multi-purpose sensor networks. Simplicity in the Wireless Sensor Network with nodes with limited resources makes them extremely vulnerable to the variety of attacks. In a wireless sensor, sensor nodes monitor the environment, detect events of interest, produce data, and assist in forwarding data to a sink, which could be a gateway, base station, or storage node. Ensuring Wireless Sensor Networks requires that the network support all security properties: confidentiality, integrity, authenticity and availability. Often, a sensor network deploys in an unattended and hostile environment to perform monitoring and data collection tasks. When deployed in such an environment, it lacks physical protection and is subject to node compromises. After compromising one or more sensor nodes, an adversary may launch several attacks to interrupt communication within the network. Between these attacks, two commons are dropping packets and modifying packets, that is, compromised nodes drop or modify packets that are supposed to be forwarded.