CFP last date
20 January 2025
Reseach Article

Watchdog: A Study on Examining and Eliminating Misbehaviour

by Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan, Anchit Bijalwan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 3
Year of Publication: 2014
Authors: Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan, Anchit Bijalwan
10.5120/15185-3541

Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan, Anchit Bijalwan . Watchdog: A Study on Examining and Eliminating Misbehaviour. International Journal of Computer Applications. 87, 3 ( February 2014), 1-3. DOI=10.5120/15185-3541

@article{ 10.5120/15185-3541,
author = { Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan, Anchit Bijalwan },
title = { Watchdog: A Study on Examining and Eliminating Misbehaviour },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 3 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number3/15185-3541/ },
doi = { 10.5120/15185-3541 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:56.641203+05:30
%A Saurabh Bora
%A Shivendra Singh
%A Sheikh Mohamad Arsalan
%A Anchit Bijalwan
%T Watchdog: A Study on Examining and Eliminating Misbehaviour
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 3
%P 1-3
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WSN is a mechanism which is widely deployed for data monitoring in industrial, commercial and many other fields (like military etc. ). Many of research have generally focused on making the network feasible and as useful as possible, but in the advent of this the security was given a very less priority and no attention was given to its security. These WSN networks face a wide variety of threats like the wormholes, grey hole attack, message tampering and selective forwarding etc. WSN are mainly attacked by the malicious packet drops. Now talking about the MANET (Mobile Ad hoc Networking) which is defined as the collection of wireless mobile nodes. MANET forms a network without using any of the infrastructures. The algorithm used to overcome this problem is the watchdog algorithm, but the watchdog algorithm has a partial drop problem, in this partial drop problem the attacker can manipulate the packet dropping rate below the threshold. Watchdog does not consider the traffic situations; these situations include congestion and collision. Through this article we have tried to eliminate the drawbacks of the watchdog algorithm. This paper proposes four theories for eliminating drawbacks of the watchdog.

References
  1. K´alm´an Graffi, Parag S. Mogre, Matthias Hollick, and Ralf Steinmetz , "Detection of Colluding Misbehaving Nodes in Mobile Ad hoc and Wireless Mesh Networks," in IEEE GLOBECOM, November 2007.
  2. F. Kargl et al. , "Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks," in Proceedings of ESAS '04, 2004.
  3. A. Babu Karuppiah, T. Meenakshi, T. I. Mano Ranjitha & S. Vivitha, "False Misbehaviour Elimination in Watchdog Monitoring System Using Change Point In a Wireless Sensor Network," in GRET.
  4. Kim, MinJi, Muriel Medard, and Joao Barros. "Algebraic Watchdog: Mitigating Misbehaviour in Wireless Network Coding. "IEEE Journal on Selected Areas in Communications 29. 10(2011)
  5. H. Yang, J. Shu, X. Meng, and S. Lu, ?SCAN: Self-organized network layer security in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp. 261-273, February 06.
  6. 6-Youngho Cho and Gang Qu, Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks, IEEE Symposium on Security and Privacy Workshops, 2012.
  7. S. Sujatha, B. Lakshmi Radhika, "A Study On Enhanced Adaptive Acknowledge (EAACK) Scheme In Receiver Collisions – An IDS In Wireless Mobile Ad-Hoc Networks," in The International Journal Of Engineering And Science (IJES).
  8. Extended Watchdog Mechanism for Wireless Sensor Networks Lei Huang, Lixiang Liu, Journal of Information and Computing Science, 2007.
  9. S. Matri, T. J. Giuli, K. Lai and M. Baker, Mitigating Routing misbehaviour in Mobile Ad Hoc Networks. Proceedings of the 6th annual international conference on Mobile Computing and Networking (MOBICOM), Boston, Massachusetts, United States, 2000, 255-265.
  10. Oscar F. Gonzalez, Michael Howarth, and George Pavlou, Detection of Packet Forwarding Misbehaviour in Mobile Ad-Hoc Networks. Center for Communications Systems Research, University of Surrey, Guildford, UK. Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on May 21, 2007.
  11. Komala CR, Srinivas Shetty, Padmashree S. , Elevarasi E. , ?Wireless Ad hoc Mobile Networks, National Conference on Computing Communication and Technology, pp. 168-174, 2010.
  12. F. Anjum, Anup K. Ghosh, Nada Golmie, Paul lodzy, Radha Poovendran, Rajeev Shorey, D. Lee, J-Sac, ?Security in Wireless Ad hoc Networks, IEEE journal on selected areas in communications, vol. 24, no. 2, February 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Halt Acknowledgement Numbering Detection Graph