Wireless sensor Networks have many promising applications for monitoring and store critical region information, such as military surveillance and tracking endangers target. Therefore it is necessary to provide wireless sensor network not only with the acceptable reliability of services but also provide adequate level of security. Protecting source location becomes important and also difficult to implement in case secure wireless sensor networks are gives their operating constraint. In existing solution defend the leakage information from a limited local adversary who can only monitor network traffic in small region, while the global adversary can monitor the large network traffic. We proposed, In Sensor networks use random walk path and generate fake packet to make hard for an adversary to trace real information in network. We have required setting time for a particular node for activating path on that time period to confuse for global adversary. We are deployed eavesdropping active and passive, malicious node, black-hole, gray-hole, faulty node in network simulation. In black hole, gray-hole attacks, compromised node drops all the packets forwarding through it. The simulation result shows that the schema improves the safety time, secure time compared to an existing method. We had analyzed the ability of our proposed scheme to withstand different attacks and demonstrate. Our main aim is to focus on safety time, security time as a major parameter. We can achieve comparable privacy protection, routing Load normalization, packet delivery ratio, throughput and end to end delay as a minor parameter. © 2015 IEEE.