Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer

Authors

  • Gayathri C Dept. of IT, School of Computer Science and Engineering, Bharathiar University, Coimbatore, India
  • Vadivel R Dept. of IT, School of Computer Science and Engineering, Bharathiar University, Coimbatore, India

DOI:

https://doi.org/10.26438/ijcse/v5i9.204209

Keywords:

MANET, Security, Watchdog, Comparison, Static and Dynamic

Abstract

Wireless network is one of the significant aspects for the roaming users while they travel across the networks transfer of data may done. It provide issues like data attackers were catch the files and they used by their way. Hence user of the network faces the security problems. For this issues watchdog mechanism were provide to monitor the attackers. The watchdog technique is a trust based attacker detection technique which identifies the malicious nodes and its activity in the network is to monitor the nodes within its communication range. The nodes selected as the watchdog nodes are the most trustworthy nodes due to its inherent features like highly stable. For this aspect static and dynamic watchdog techniques were followed, this article provides the comparison between static and dynamic watchdog mechanism to shows which technique provide the best.

References

Singh UK, Mewada S, Iaddhani L, Bunkar K. “An overview and study of security issues & challenges in mobile ad-hoc networks (manet)”,International Journal of Computer Science and Information Security, Vol.9, Issue.4, pp.106-111, 2011.

Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.

Indhu Lekha, S.J., Kathiroli, R. “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCCT 2014, pp. 1185–1189.

Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.

N.Soganile1 , T. Baletlwa , and B. Moyo “Hybrid Watchdog and Pathrater algorithm for improved security in Mobile Ad Hoc Networks”, Int’I Conf.Wireless Networks ICWN’2015.

SJI Lekha, S.J., Kathiroli, R., “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCT ,pp 1185-1189, 2014.

Zuckerman, M., Faliszewski, P., Bachrach, Y., et al. “Manipulating the quota in weighted voting games”. Conf. on Artificial Intelligence, pp. 215–220. 2008.

Liu,W., Nishiyama, H, Ansari, N, Yang J, Kato N, “Cluster-based certificate Revocation with Vindication Capability for Mobile Adhoc Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol.24, No.2 pp 1 to 12, 2013.

Izquierdo, L.R., Izquierdo, S.S. ‘Dynamics of the Bush–Mosteller learning algorithm in 2 × 2 games’ (In Tech Publisher) 2008.

Sungwook Kim “Trust based dynamic bandwidth allocation scheme for Ethernet passive optical networks”, Wireless Personal Communications, Vol.83, No.4,pp. 2869–2882, 2015.

Moretti Annoni M, Fernado Cruz, Goncalves Riso B, Westphall “Wireless Communications : Security Management Against Cloned Cellular Phones”, Wireless Communications and Networking Conference-IEEE, pp 1412-1416, 1999.

Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.

J. Kaur, G.Singh, "MANET Routing Protocols: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.60-64, 2017.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i9.204209
Published: 2025-11-12

How to Cite

[1]
C. Gayathri and R. Vadivel, “Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer”, Int. J. Comp. Sci. Eng., vol. 5, no. 9, pp. 204–209, Nov. 2025.

Issue

Section

Research Article