Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer
DOI:
https://doi.org/10.26438/ijcse/v5i9.204209Keywords:
MANET, Security, Watchdog, Comparison, Static and DynamicAbstract
Wireless network is one of the significant aspects for the roaming users while they travel across the networks transfer of data may done. It provide issues like data attackers were catch the files and they used by their way. Hence user of the network faces the security problems. For this issues watchdog mechanism were provide to monitor the attackers. The watchdog technique is a trust based attacker detection technique which identifies the malicious nodes and its activity in the network is to monitor the nodes within its communication range. The nodes selected as the watchdog nodes are the most trustworthy nodes due to its inherent features like highly stable. For this aspect static and dynamic watchdog techniques were followed, this article provides the comparison between static and dynamic watchdog mechanism to shows which technique provide the best.
References
Singh UK, Mewada S, Iaddhani L, Bunkar K. “An overview and study of security issues & challenges in mobile ad-hoc networks (manet)”,International Journal of Computer Science and Information Security, Vol.9, Issue.4, pp.106-111, 2011.
Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.
Indhu Lekha, S.J., Kathiroli, R. “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCCT 2014, pp. 1185–1189.
Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
N.Soganile1 , T. Baletlwa , and B. Moyo “Hybrid Watchdog and Pathrater algorithm for improved security in Mobile Ad Hoc Networks”, Int’I Conf.Wireless Networks ICWN’2015.
SJI Lekha, S.J., Kathiroli, R., “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCT ,pp 1185-1189, 2014.
Zuckerman, M., Faliszewski, P., Bachrach, Y., et al. “Manipulating the quota in weighted voting games”. Conf. on Artificial Intelligence, pp. 215–220. 2008.
Liu,W., Nishiyama, H, Ansari, N, Yang J, Kato N, “Cluster-based certificate Revocation with Vindication Capability for Mobile Adhoc Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol.24, No.2 pp 1 to 12, 2013.
Izquierdo, L.R., Izquierdo, S.S. ‘Dynamics of the Bush–Mosteller learning algorithm in 2 × 2 games’ (In Tech Publisher) 2008.
Sungwook Kim “Trust based dynamic bandwidth allocation scheme for Ethernet passive optical networks”, Wireless Personal Communications, Vol.83, No.4,pp. 2869–2882, 2015.
Moretti Annoni M, Fernado Cruz, Goncalves Riso B, Westphall “Wireless Communications : Security Management Against Cloned Cellular Phones”, Wireless Communications and Networking Conference-IEEE, pp 1412-1416, 1999.
Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.
J. Kaur, G.Singh, "MANET Routing Protocols: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.60-64, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
