It is important to note that this watchdog system needs
to know where packets are supposed to be in two hops in
order to function optimally. This is why it is suitable for use
on networks using a source routing protocol. If there is not
enough information to determine where a packet should be
in two hops, a malicious node may “forward” a packet to a
non-existent node to trick the watchdog into assuming that the
packet was transmitted to a legitimate next hop