Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Watchdog: A Study on Examining and Eliminating Misbehaviour

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 3
Year of Publication: 2014
Saurabh Bora
Shivendra Singh
Sheikh Mohamad Arsalan
Anchit Bijalwan

Saurabh Bora, Shivendra Singh, Sheikh Mohamad Arsalan and Anchit Bijalwan. Article: Watchdog: A Study on Examining and Eliminating Misbehaviour. International Journal of Computer Applications 87(3):1-3, February 2014. Full text available. BibTeX

	author = {Saurabh Bora and Shivendra Singh and Sheikh Mohamad Arsalan and Anchit Bijalwan},
	title = {Article: Watchdog: A Study on Examining and Eliminating Misbehaviour},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {3},
	pages = {1-3},
	month = {February},
	note = {Full text available}


WSN is a mechanism which is widely deployed for data monitoring in industrial, commercial and many other fields (like military etc. ). Many of research have generally focused on making the network feasible and as useful as possible, but in the advent of this the security was given a very less priority and no attention was given to its security. These WSN networks face a wide variety of threats like the wormholes, grey hole attack, message tampering and selective forwarding etc. WSN are mainly attacked by the malicious packet drops. Now talking about the MANET (Mobile Ad hoc Networking) which is defined as the collection of wireless mobile nodes. MANET forms a network without using any of the infrastructures. The algorithm used to overcome this problem is the watchdog algorithm, but the watchdog algorithm has a partial drop problem, in this partial drop problem the attacker can manipulate the packet dropping rate below the threshold. Watchdog does not consider the traffic situations; these situations include congestion and collision. Through this article we have tried to eliminate the drawbacks of the watchdog algorithm. This paper proposes four theories for eliminating drawbacks of the watchdog.


  • K´alm´an Graffi, Parag S. Mogre, Matthias Hollick, and Ralf Steinmetz , "Detection of Colluding Misbehaving Nodes in Mobile Ad hoc and Wireless Mesh Networks," in IEEE GLOBECOM, November 2007.
  • F. Kargl et al. , "Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks," in Proceedings of ESAS '04, 2004.
  • A. Babu Karuppiah, T. Meenakshi, T. I. Mano Ranjitha & S. Vivitha, "False Misbehaviour Elimination in Watchdog Monitoring System Using Change Point In a Wireless Sensor Network," in GRET.
  • Kim, MinJi, Muriel Medard, and Joao Barros. "Algebraic Watchdog: Mitigating Misbehaviour in Wireless Network Coding. "IEEE Journal on Selected Areas in Communications 29. 10(2011)
  • H. Yang, J. Shu, X. Meng, and S. Lu, ?SCAN: Self-organized network layer security in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp. 261-273, February 06.
  • 6-Youngho Cho and Gang Qu, Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks, IEEE Symposium on Security and Privacy Workshops, 2012.
  • S. Sujatha, B. Lakshmi Radhika, "A Study On Enhanced Adaptive Acknowledge (EAACK) Scheme In Receiver Collisions – An IDS In Wireless Mobile Ad-Hoc Networks," in The International Journal Of Engineering And Science (IJES).
  • Extended Watchdog Mechanism for Wireless Sensor Networks Lei Huang, Lixiang Liu, Journal of Information and Computing Science, 2007.
  • S. Matri, T. J. Giuli, K. Lai and M. Baker, Mitigating Routing misbehaviour in Mobile Ad Hoc Networks. Proceedings of the 6th annual international conference on Mobile Computing and Networking (MOBICOM), Boston, Massachusetts, United States, 2000, 255-265.
  • Oscar F. Gonzalez, Michael Howarth, and George Pavlou, Detection of Packet Forwarding Misbehaviour in Mobile Ad-Hoc Networks. Center for Communications Systems Research, University of Surrey, Guildford, UK. Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on May 21, 2007.
  • Komala CR, Srinivas Shetty, Padmashree S. , Elevarasi E. , ?Wireless Ad hoc Mobile Networks, National Conference on Computing Communication and Technology, pp. 168-174, 2010.
  • F. Anjum, Anup K. Ghosh, Nada Golmie, Paul lodzy, Radha Poovendran, Rajeev Shorey, D. Lee, J-Sac, ?Security in Wireless Ad hoc Networks, IEEE journal on selected areas in communications, vol. 24, no. 2, February 2006.