Upload
arockiaruby-ruby
View
10
Download
1
Embed Size (px)
DESCRIPTION
Existing intrusion detection systems in MANET
Citation preview
EXISTING SYSTEM
Existing intrusion detection system uses the system called EAACK-Enhanced Adaptive
ACKnowledgement is used to detect such attackers. It is acknowledgement based intrusion
detection system (IDS). Digital signature is also used with this approach to ensure the
confidentiality, authentication and integrity of the information. EAACK is designed to manage
some important problems such as false misbehavior, limited transmission power and packet
dropping. EAACK relay on packet acknowledgement to detect misbehaviors in the network. It
uses multi hop routing to overcome the limited transmission power of nodes. It avoids the route
with the malicious nodes to prevent the packet dropping. For the communication process both
the source node and destination node are not malicious. It requires all acknowledgement packets
to be digitally signed by its sender before they are sent out and verified by its receiver node.
Digital signature can be generalized as a data string, which associates a message (in
digital form) with some originating entity, or an electronic analog of a written signature. Digital
signature is used to ensure that all acknowledgement packets in this scheme are authentic and
untainted.
DRAWBACKS
If the attackers are smart enough to forge the acknowledgement packets, it is very
difficult to find the malicious nodes in the network.
Digital signature algorithm uses the pre distribution of keys; it creates the overhead in the
network.