The architecture of IDS is discussed in the manuscript to achieve the reliable and confidential transmission over MANET which follows some techniques such as Watch Dog, Confident, and CORE.
Flooding-based route discovery is usually preferred in MANETs in order to set up the route with reliability between transmission pair. However, this approach may cause a serious contention in information transfer between adjacent nodes and a considerable amount of control packets. The transfer of information between nodes is made secured by Intrusion detection system (IDS). The architecture of IDS is discussed in the manuscript to achieve the reliable and confidential transmission over MANET which follows some techniques such as Watch Dog, Confident, and CORE. KeywordsCryptographic attacks in MANET, IDS, architecture of IDS, Watch Dog, CORE.