title,doi,url,abstract,journal,publication_year,pmid,arxiv Enhancing and Securing the Routing Techniques in Wireless Sensor Networks, https://doi.org/10.32628/CSEIT206242, https://ijsrcseit.com/CSEIT206242, A wireless network node network (WSN) is defined as being composed of a large number of small light weighted nodes called network node nodes with routing processing and communication facilities which are densely deployed in physical or environmental condition. Each of these nodes collects data and its purpose is to route this information back to a sink. WSN is highly constrained type of network having network node nodes with more capabilities. All network node nodes in the wireless network node network are interact with each other by intermediated network node nodes. Physical parameters computations are power energy memory communication range and bandwidth. Wireless ad-hoc networks mainly use broadcast communication. Upon deployment network node nodes automatically collaborate and form a network start collecting data without any input from the user. The proposed model has been improved for the route metric calculation along with node and link load availability information module to avoid the connectivity loopholes and link congestions. The proposed model results have been obtained in the form of various network performance parameters such as network load transmission delay throughput energy consumption etc. In wireless sensor networks there are many types of attacks that can hinder or obstruct the data to be deliver to the authenticated node so in order to check which node is authenticated various algorithms have been proposed. There are various attacks like Denial of Service Distributed Denial of Service and various types of Jamming attacks that can disrupt or deny the communication between sender and receiver. It is important to develop some powerful tools for network analysis design and managing the performance optimization of the network. In this paper some of the most common attacks and threats are explained and the prevention that can be taken by using various tools is implemented. Also the different routes are configured if the particular route is not available. All the nodes and the attacks are been shown by using a simulator NS2. , International Journal of Scientific Research in Computer Science Engineering and Information Technology, 2020, CSEIT206242