Current Trends in Technology and Science
ISSN: 2279- 0535. Volume: 3, Issue: 4(June-July 2014)
Copyright © 2014 CTTS.IN, All right reserved
271
False Misbehavior Removal in Clonal Selection Mechanism
Based on Watchdog by the use of Transition Point in a
Wireless Sensor Network
Phiza Ambreen Khan
Research Scholar, Department of CSE (Software Engineering), SSSIST,Sehore, M.P., India, fiza9387@gmail.com
Kailash K. Patidar
Assistant Professor, Department of CSE (Software Engineering), SSSIST, Sehore, M.P., India,
Gajendra Singh
Professor & Head, Department of CSE (Software Engineering), SSSIST,Sehore, M.P.,
India, gajendrasingh@gmail.com
Mukesh Tiwari
Dean Academic, SSSIST, Sehore, M.P., India,
Abstract — A wireless sensor network is a network
consisting of number of wireless sensors, also called as
node, which cooperate each other in sensing some sort
of physical characteristics or general environmental
conditions, such as temperature, sound, vibrations,
light, movement etc. These networks can consist of
everything from smaller number of nodes for sparsely
populated networks, up to 100’s of thousands of nodes
in densely populated networks. Watchdog algorithm
is in existence is unable to catch the misbehaving
sensors due to which network traffic is being upset.
Our goal is to create an IDS such that the throughput
of the system must be efficiently increased and PDR
must be improved. The constraint of the system with
our protection scheme must be comparable with the
system without having any attack. We implement two
algorithms simultaneously to detect the nodes which
acting as true node and fake other true nodes to be
misbehaving. We implement this approach in the
watchdog mechanism to improve the performance,
throughput, accuracy, energy efficiency at low cost
and less time consuming.
Keyword — Wireless Sensor Network, Security
Goal, False misbehavior, Numbering, Energy
Consumption, Watchdog, IDS
1. INTRODUCTION
A wireless sensor network is a network [1] consisting of
number of wireless sensors, also called as node, which
cooperate each other in sensing some sort of physical
characteristics or general environmental conditions, such
as temperature, sound, vibrations, light, movement etc.
These networks can consist of everything from smaller
number of nodes for sparsely populated networks, up to
100’s of thousands of nodes in densely populated
networks. The individual sensor nodes are relatively small
and have limited amount of energy, computational power
and memory. For this reason they are well suited to a
substantial amount of monitoring and surveillance
applications. Popular wireless sensor network
applications include wildlife monitoring, bushfire
response, military command, intelligent
communications, industrial quality control, observation
of critical infrastructures, smart buildings, distributed
robotics, traffic monitoring, examining human heart
rates etc. Majority of the sensor network are deployed in
hostile environments with active intelligent opposition.
Hence security is a crucial issue. One obvious example
is battlefield applications where there is a pressing need
for secrecy of location and resistance to subversion and
destruction of the network. Majority of the sensor
network are deployed in unreceptive environments with
active intelligent opponent. Hence security is a crucial
issue. The nodes in network are performing routing
independent but the whole activity of nodes is watch by
Base Station (BS). Less obvious but just as important
security dependent applications [2, 3, 4] include:
• Disasters: In many disaster scenarios, especially
those induced by terrorist activities, it may be
necessary to protect the location of casualties from
unauthorized disclosure
• Public Safety: In applications where chemical,
biological or other environmental threats are
monitored, it is vital that the availability of the
network is never threatened. Attacks causing false
alarms may lead to panic responses or even worse
total disregard for the signals.
• Home Healthcare: In such applications, privacy
protection is essential. Only authorized users should
be able to query and monitor the network.
Basically attacks are classified into two types: Active
attacks and Passive. False misbehavior Attack is active
in nature. A malicious node purposely reports that
other nodes are misbehaving. A sensor node which is
malicious in nature can report that some other true node