Wireless sensor network consists of entity nodes that are able to work together with their surroundings by sensing or scheming corporeal parameters. The major issue in wsn is information accessed by unauthorized party by clone node. Once a node is captured, the attacker can reprogram and then take over the network process. The proposed algorithm is chord and DHT (Distributed hash table).The RDE protocol is used to detect clone node and chord algorithm provides the neighbor details. The DHT is used to store the node ID, key, location and source ID, destination ID. Here every node is assigned with a unique key which is verified by a witness node before transmitting data. A distributed detection protocol, known as randomly directed exploration (RDE), presents outstanding communication performance and minimal storage consumption for dense sensor networks. It is a location based node identification protocol. The group leader will be generating random number with appropriate location. Witness node are used to verify the random number detect the clone.