Open Access   Article Go Back

Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer

Gayathri C.1 , Vadivel R.2

  1. School of Computer Science and Engineering, Bharathiar University, Coimbatore, India.
  2. School of Computer Science and Engineering, Bharathiar University, Coimbatore, India.

Correspondence should be addressed to: vlr_vadivel@yahoo.co.in.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-9 , Page no. 204-209, Sep-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.204209

Online published on Sep 30, 2017

Copyright © Gayathri C., Vadivel R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Gayathri C., Vadivel R., “Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.204-209, 2017.

MLA Style Citation: Gayathri C., Vadivel R. "Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer." International Journal of Computer Sciences and Engineering 5.9 (2017): 204-209.

APA Style Citation: Gayathri C., Vadivel R., (2017). Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer. International Journal of Computer Sciences and Engineering, 5(9), 204-209.

BibTex Style Citation:
@article{C._2017,
author = {Gayathri C., Vadivel R.},
title = {Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2017},
volume = {5},
Issue = {9},
month = {9},
year = {2017},
issn = {2347-2693},
pages = {204-209},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1457},
doi = {https://doi.org/10.26438/ijcse/v5i9.204209}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i9.204209}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1457
TI - Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer
T2 - International Journal of Computer Sciences and Engineering
AU - Gayathri C., Vadivel R.
PY - 2017
DA - 2017/09/30
PB - IJCSE, Indore, INDIA
SP - 204-209
IS - 9
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
511 282 downloads 344 downloads
  
  
           

Abstract

Wireless network is one of the significant aspects for the roaming users while they travel across the networks transfer of data may done. It provide issues like data attackers were catch the files and they used by their way. Hence user of the network faces the security problems. For this issues watchdog mechanism were provide to monitor the attackers. The watchdog technique is a trust based attacker detection technique which identifies the malicious nodes and its activity in the network is to monitor the nodes within its communication range. The nodes selected as the watchdog nodes are the most trustworthy nodes due to its inherent features like highly stable. For this aspect static and dynamic watchdog techniques were followed, this article provides the comparison between static and dynamic watchdog mechanism to shows which technique provide the best.

Key-Words / Index Term

MANET, Security, Watchdog, Comparison, Static and Dynamic

References

[1] Singh UK, Mewada S, Iaddhani L, Bunkar K. “An overview and study of security issues & challenges in mobile ad-hoc networks (manet)”,International Journal of Computer Science and Information Security, Vol.9, Issue.4, pp.106-111, 2011.
[2] Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.
[3] Indhu Lekha, S.J., Kathiroli, R. “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCCT 2014, pp. 1185–1189.
[4] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[5] N.Soganile1 , T. Baletlwa , and B. Moyo “Hybrid Watchdog and Pathrater algorithm for improved security in Mobile Ad Hoc Networks”, Int’I Conf.Wireless Networks ICWN’2015.
[6] SJI Lekha, S.J., Kathiroli, R., “Trust based certificate revocation of malicious nodes in MANET”, IEEE ICACCT ,pp 1185-1189, 2014.
[7] Zuckerman, M., Faliszewski, P., Bachrach, Y., et al. “Manipulating the quota in weighted voting games”. Conf. on Artificial Intelligence, pp. 215–220. 2008.
[8] Liu,W., Nishiyama, H, Ansari, N, Yang J, Kato N, “Cluster-based certificate Revocation with Vindication Capability for Mobile Adhoc Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol.24, No.2 pp 1 to 12, 2013.
[9] Izquierdo, L.R., Izquierdo, S.S. ‘Dynamics of the Bush–Mosteller learning algorithm in 2 × 2 games’ (In Tech Publisher) 2008.
[10]Sungwook Kim “Trust based dynamic bandwidth allocation scheme for Ethernet passive optical networks”, Wireless Personal Communications, Vol.83, No.4,pp. 2869–2882, 2015.
[11] Moretti Annoni M, Fernado Cruz, Goncalves Riso B, Westphall “Wireless Communications : Security Management Against Cloned Cellular Phones”, Wireless Communications and Networking Conference-IEEE, pp 1412-1416, 1999.
[12] Pooja saini and Meenakshi Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015.
[13] J. Kaur, G.Singh, "MANET Routing Protocols: A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.60-64, 2017.