Current Trends in Technology and Science ISSN: 2279- 0535. Volume: 3, Issue: 4(June-July 2014) Copyright © 2014 CTTS.IN, All right reserved 271 False Misbehavior Removal in Clonal Selection Mechanism Based on Watchdog by the use of Transition Point in a Wireless Sensor Network Phiza Ambreen Khan Research Scholar, Department of CSE (Software Engineering), SSSIST,Sehore, M.P., India, fiza9387@gmail.com Kailash K. Patidar Assistant Professor, Department of CSE (Software Engineering), SSSIST, Sehore, M.P., India, Gajendra Singh Professor & Head, Department of CSE (Software Engineering), SSSIST,Sehore, M.P., India, gajendrasingh@gmail.com Mukesh Tiwari Dean Academic, SSSIST, Sehore, M.P., India, Abstract A wireless sensor network is a network consisting of number of wireless sensors, also called as node, which cooperate each other in sensing some sort of physical characteristics or general environmental conditions, such as temperature, sound, vibrations, light, movement etc. These networks can consist of everything from smaller number of nodes for sparsely populated networks, up to 100’s of thousands of nodes in densely populated networks. Watchdog algorithm is in existence is unable to catch the misbehaving sensors due to which network traffic is being upset. Our goal is to create an IDS such that the throughput of the system must be efficiently increased and PDR must be improved. The constraint of the system with our protection scheme must be comparable with the system without having any attack. We implement two algorithms simultaneously to detect the nodes which acting as true node and fake other true nodes to be misbehaving. We implement this approach in the watchdog mechanism to improve the performance, throughput, accuracy, energy efficiency at low cost and less time consuming. Keyword Wireless Sensor Network, Security Goal, False misbehavior, Numbering, Energy Consumption, Watchdog, IDS 1. INTRODUCTION A wireless sensor network is a network [1] consisting of number of wireless sensors, also called as node, which cooperate each other in sensing some sort of physical characteristics or general environmental conditions, such as temperature, sound, vibrations, light, movement etc. These networks can consist of everything from smaller number of nodes for sparsely populated networks, up to 100’s of thousands of nodes in densely populated networks. The individual sensor nodes are relatively small and have limited amount of energy, computational power and memory. For this reason they are well suited to a substantial amount of monitoring and surveillance applications. Popular wireless sensor network applications include wildlife monitoring, bushfire response, military command, intelligent communications, industrial quality control, observation of critical infrastructures, smart buildings, distributed robotics, traffic monitoring, examining human heart rates etc. Majority of the sensor network are deployed in hostile environments with active intelligent opposition. Hence security is a crucial issue. One obvious example is battlefield applications where there is a pressing need for secrecy of location and resistance to subversion and destruction of the network. Majority of the sensor network are deployed in unreceptive environments with active intelligent opponent. Hence security is a crucial issue. The nodes in network are performing routing independent but the whole activity of nodes is watch by Base Station (BS). Less obvious but just as important security dependent applications [2, 3, 4] include: Disasters: In many disaster scenarios, especially those induced by terrorist activities, it may be necessary to protect the location of casualties from unauthorized disclosure Public Safety: In applications where chemical, biological or other environmental threats are monitored, it is vital that the availability of the network is never threatened. Attacks causing false alarms may lead to panic responses or even worse total disregard for the signals. Home Healthcare: In such applications, privacy protection is essential. Only authorized users should be able to query and monitor the network. Basically attacks are classified into two types: Active attacks and Passive. False misbehavior Attack is active in nature. A malicious node purposely reports that other nodes are misbehaving. A sensor node which is malicious in nature can report that some other true node