International Journal of Computer & Organization Trends –Volume 3 Issue 11 – Dec 2013
SEIDS-A Secure Enhanced Intrusion Detection System with DS in MANETS J J N H Chakradhar Mtech(Cse) Gudlavalleru Engg. College
Y.Adi Lakshmi Associate Professor Cse Dept Gudlavalleru Engg College
Abstract – Mobile Ad-hoc Networking (MANET) is
receiving growing attention as a means of providing communications in environments where there is no existing infrastructure. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. Every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. A MANET is a possible solution for this need to quickly establish communications in a mobile and transient environment. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this system, we propose a new rule based intrusion-detection with digital signature system SEIDS, will be created. SEIDS will secure enhance intrusion detection and respond to intrusion with an enhanced group key distribution scheme. Keywords – A C K , Message, Digital Signature.
I. INTRODUCTION The nature of mobility for mobile networks needs additional mechanisms for providing security. These vulnerabilities do not exist in a fixed wired network. Therefore, the traditional way of protecting networks with firewalls and encryption software is no longer sufficient. We need to develop new architecture and mechanisms to protect the wire-less networks and mobile computing applications. Hence, in this paper, we discuss how to identify the intrusion after an anomaly is reported. Simple rules are applied to identify the intruder information and detect the type of the attack. A node called the Monitor node carries the identification process. This node overhears the channel and detects the misbehavior nodes. There may be more than one monitor
ISSN: 2249-2593
node in the whole network. Periodically the monitor nodes are elected in the network. A simple definition of routing is "learning how to get from here to there." In some cases, the term routing is used in a very strict sense to refer only to the process of obtaining and distributing information, but not to the process of using that information to actually get from one place to. Since it is difficult to grasp the usefulness of information that is acquired but never used, we employ the term routing to refer in general to all the things that are done to discover and advertise paths from here to there and to actually move packets from here to there when necessary. The distinction between routing and forwarding is preserved in the formal discussion of the functions performed by OSI end systems and intermediate systems, in which context the distinction is meaningful.
Routing is the act of moving information across an inter network from a source to a destination. Along the way, at least one intermediate node typically is encountered. Routing is the process of finding a path from a source to every destination in the network. It allows users in the remote part of the world to get to information and services provided by computers anywhere in the world. Routing is accomplished by means of routing protocols that establish mutually consistent routing tables in every router in the Network. When a packet is received by the router or is forwarded by the host, they both must make decisions as to how to send the packet. To do this, the router and the host consult a database for information known as the routing table. This database is stored in RAM so that the lookup process is optimized. As the packet is forwarded through various routers towards its destination, each router makes a decision so as to proceed by consulting its routing table. A routing table consists at least two columns: the first is address of a destination point or destination Network , and the second is the address of the next element that is the next hop in the "best" path to its destination. When a packet arrives at a router the router or the switch controller consults the routing table to decide the next hop for the packet. Not only the local information but the global information is also consulted for routing. But global information is hard to collect,
http://www.ijcotjournal.org
Page 511