期刊名称:International Journal of Electronics, Communication and Soft Computing Science and Engineering
印刷版ISSN:2277-9477
出版年度:2015
卷号:4
期号:Special 3
出版社:IJECSCSE
摘要:The information transferred between nodes is made secure by Intrusion detection system (IDS) us ing techniques watchdog and path rater. By eavesdropping on the transmission of the next hop, the watchdog finds the misbehaving nodes. A path rater helps to identify the routes that do not contain n those misbehaving nodes. The watchdog is implemented by maintaining a buffer of recently sent packets. Comparing each overheard packet with the packet in the buffer to see if there is a match. If so, the packet in the buffer is removed and forgotten by the watchdog, since it has been forwarded on. If a pa cket has remained in the buffer for longer than a certain timeout, the watchdog increments a failure tally for the node responsible for forwarding on the packet