be deployed on it, the security is now becoming an evident feature. Lot many security
architectures are proposed, but looking to the energy and memory constraints, the
implementation still demands good amount of research. The simpler way seems is, to detect
the intruder as early as possible and take the corrective steps for damage control. Here we
propose an improved secured hash based IDS strategy using deployment knowledge. This …