2
EXISTING SYSTEM Existing intrusion detection system uses the system called EAACK-Enhanced Adaptive ACKnowledgement is used to detect such attackers. It is acknowledgement based intrusion detection system (IDS). Digital signature is also used with this approach to ensure the confidentiality, authentication and integrity of the information. EAACK is designed to manage some important problems such as false misbehavior, limited transmission power and packet dropping. EAACK relay on packet acknowledgement to detect misbehaviors in the network. It uses multi hop routing to overcome the limited transmission power of nodes. It avoids the route with the malicious nodes to prevent the packet dropping. For the communication process both the source node and destination node are not malicious. It requires all acknowledgement packets to be digitally signed by its sender before they are sent out and verified by its receiver node. Digital signature can be generalized as a data string, which associates a message (in digital form) with some originating entity, or an electronic analog of a written signature. Digital signature is used to ensure that all acknowledgement packets in this scheme are authentic and untainted. DRAWBACKS

Existing System

Embed Size (px)

DESCRIPTION

Existing intrusion detection systems in MANET

Citation preview

Page 1: Existing System

EXISTING SYSTEM

Existing intrusion detection system uses the system called EAACK-Enhanced Adaptive

ACKnowledgement is used to detect such attackers. It is acknowledgement based intrusion

detection system (IDS). Digital signature is also used with this approach to ensure the

confidentiality, authentication and integrity of the information. EAACK is designed to manage

some important problems such as false misbehavior, limited transmission power and packet

dropping. EAACK relay on packet acknowledgement to detect misbehaviors in the network. It

uses multi hop routing to overcome the limited transmission power of nodes. It avoids the route

with the malicious nodes to prevent the packet dropping. For the communication process both

the source node and destination node are not malicious. It requires all acknowledgement packets

to be digitally signed by its sender before they are sent out and verified by its receiver node.

Digital signature can be generalized as a data string, which associates a message (in

digital form) with some originating entity, or an electronic analog of a written signature. Digital

signature is used to ensure that all acknowledgement packets in this scheme are authentic and

untainted.

DRAWBACKS

If the attackers are smart enough to forge the acknowledgement packets, it is very

difficult to find the malicious nodes in the network.

Digital signature algorithm uses the pre distribution of keys; it creates the overhead in the

network.