International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 58
Abstract: Mobile Adhoc NETwork is the self organized infrastructure less network which is formed by a collection of mobile nodes that communicate with each other via wireless links directly or with the help of intermediate nodes. These mobile nodes contain both transmitter and receiver in them. In this paper we discuss the MANETs, Categories and various IDS with their limitations.
Keywords: MANETs, IDS Credit Based Schemes, Reputation Based Schemes, Acknowledgement schemes
1.INTRODUCTION Routing protocols such as Dynamic Source Routing can be used to determine the route from a node to another node. Due to its nature of open medium, the MANETs may have severe threats posed by attackers or malicious node. Nodes in the network move rapidly and hence there is no fixed network topology for MANETs. There are two types of MANETs: Closed MANETs Open MANETs [1] Closed MANETs: In close MANETs all the mobile nodes work collaboratively to accomplish a common goal. Eg: Military operations. Open MANETs: In open MANETs all the nodes in the network have their own goals, yet they share their resources to accomplish some global activity. Some resources in the network will be consumed very quickly, such as battery power of mobile nodes. The nodes in the network may sometimes act as misbehaving nodes or sometimes behaves selfishly. For example, a node may attempt to benefit the resources from other nodes in the network but may refuse to share its own resources. Such nodes are called Selfish nodes or Misbehaving nodes. Another example is [2] a selfish node may refuse to forward data packets to other nodes in the network so as to conserve its energy.
2.INTRUSION DETECTION SYSTEMS Intrusion Detection System is a security management system that monitors network traffic to detect suspicious activities attempted by nodes in the network. Various schemes have been proposed to prevent selfishness in MANETs. Intrusion Detection Systems are broadly classified into three categories shown below: 1. Credit-based schemes. 2. Reputation-based schemes. 3. End-to-End Acknowledgement Scheme. 2.1 Credit-Based Schemes In this category, a credit is given to every node so that they can provide services to every other node in the network. To achieve this, virtual currency system can be set up. Every node in the network is paid for providing services to other nodes in the network. Whenever a node provides service it gets paid for it, and in turn pays the credit when it requests other nodes to help it in forwarding the packets [3], [4], [5], [6]. Buttyan [3] and Hubaux [3] proposed a concept of nuggets or beans to be paid by each node to the other nodes for helping them in packet forwarding. As a result two models were proposed by them [3]: a) The Packet Purse Model b) The Packet Trade Model i) The Packet Purse Model: In the Packet Purse Model, every packet is loaded with the nuggets before it is forwarded to the next node. The sender puts a certain number of nuggets on the data packet to be sent. Each intermediate node that forwards this packet gains nuggets from it. If the nuggets in the packet are emptied before it reaches the destination and if there are still the nodes prior to destination in the transmission path then the packet will be dropped. ii)The Packet Trade Model: In the Packet Trade Model, each node actively does the trading business. Each node buys the packet from previous node for some nuggets and sells it to the next node at a profit i.e. more nuggets. Therefore each intermediate node earns some nuggets for forwarding the packets to next node in the transmission path. The destination node bears overall cost of forwarding the packet. Limitations of Credit Based Schemes: Credit-Based schemes have a limitation that they require additional hardware or credit payment system.
2.2 Reputation-Based Schemes In Reputation Based schemes [7], [8], all the nodes in the network collaboratively work to detect and declare the suspicious node as the misbehaving node. This declaration is propagated to all the nodes in the network so as to block the misbehaving node from rest of the network. i) Watchdog & Pathrater Scheme: The watchdog [7][9][10][11][12] scheme is the IDS that detect misbehaving nodes in the network formed by mobile nodes. Watchdog is installed in all the nodes of A SURVEY & COMPARISON OF INTRUSION DETECTION SYSTEMS IN MANETS
Ms. Rasagna Chinthireddy 1 and Dr. S Aravind 2
1 Dept. of CSE, CMRIT, Kandlakoya, Hyderabad 2 Professor & Head, CSE, CMRIT, Kandlakoya, Hyderabad International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 59
the MANET. Whenever a node forwards a packet to the next node in the path to reach the destination, the watchdog installed in the node ensures that the next node in the path forwards the packet by overhearing the transmission promiscuously. Each node in the MANET does this to ensure the packets are transmitted to next node in the path. Any node that does not forward the packet which it receives is considered to be a compromised and hence is marked as misbehaving node by the previous node that sent packet to this node. In such case the failure counter of this node is incremented. A threshold is set prior to the transmission begins in the network, and if any nodes failure counter value exceeds this threshold such node is tagged as malicious node and hence this node is blocked for future transmissions. On overhearing the transmission at next node if the previous node learns that the packet is forwarded, then this next nodes trustworthiness is increased. If the Watchdog node that detected the misbehaving node is not the source node, then it sends a message to the source node identifying the misbehaving node. Watchdog is robust to most of the attacks as they use only local information. Suppose there exists a path from node A to D through the intermediate nodes B and C. A transmits the packet to node B and then promiscuously listens to node B's traffic. Since a watchdog is installed in every node, A overhears the operation of node B and can tell if B transmits the packet to C. Figure 1 [13], shows the normal case of forwarding packets from source A to destination D.
Fig 1: Normal overhearing of packets
Packet 1 is transmitted from A to B. B transmits packet from B to C. Since A is within the transmission range of B A can overhear Bs traffic, A also receives the same packet that is transferred from B to C. With the information received from B, node A can decide whether B is malicious or not. Figure 2 [13], shows the detection of malicious nodes in the transmission path. Here B is a malicious node and drops all packets instead of forwarding. Node A transmits a packet to B, but it overhears that node B does not forward the packet to next node in the path. Therefore A decides B to be malicious node and increments its failure count.
Fig 2: Malicious Node detection
In MANETs there exits more than one route to reach the destination from source. Pathrater [14] works in collaboration with the routing protocols in deciding which path should be chosen to transmit the packets to reach the destination. Every node uses the information provided by watchdogs to rate neighbor nodes. Each node in the network maintains the reliability rating for every other node in the network. Pathrater calculates the rating of each path from source to destination by taking the average of ratings all the nodes involved in the path. Since there may exist multiple paths between source and destination in MANETs, the path that has the highest reliability rating is chosen for transmission of data packets. The Routeguard [16] mechanism combines the watchdog and Pathrater solutions to classify each neighbor node as Fresh, Member, Unstable, Suspect or Malicious node. Watchdog can only monitor the first node while the second malicious node performs an attack. Limitations of the watchdog mechanism: Though the watchdog scheme is sufficient to identify the malicious nodes and packet collisions, it is difficult for a watchdog to differentiate whether the loss of a packet is due to an attack or a collision. The weaknesses of Watchdog scheme are namely, false misbehavior, limited transmission power, and receiver collision. a) Receiver Collisions Problem: Fig 3 [15] shows the receiver collisions problem that persists in Watchdog Scheme. Source node S intends to forward packet 1 to destination node D. It does so by sending packet to A and overhears its transmission, similarly A transmits packet to B. When B transmits packet, A learns that B forwarded the packet but never ensures if C received it. At the same time X tries to send packet 2 to C. Therefore both packet 1 & 2 collides at receiver C and hence both the packets are dropped. Though C had not intentionally missed forwarding packets both B and X assumes C to be malicious node and inform the same to respective sources.
Fig 3: Receiver Collision Problem in Watchdog Scheme b) False Misbehavior Report: International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 60
Figure 4 [15] shows the false misbehavior report generated by node A, though node A overhears that the packet is transmitted from node B to C. Node A intentionally does this because it so happens when a node in a network can be compromised and act as malicious node.
Fig 4: False Misbehavior Report Problem in Watchdog Scheme c) Limited Transmission Power: The nodes in the MANETs limit their transmission power in order to protect their battery from getting drained soon. This leads to limited transmission power problem to occur in watchdog scheme. Node S is source node and Node D is destination node, all the intermediate nodes in the path between S and D involve in transmitting packets. It can be seen in the Figure 5 [15], node A overhears that B transmitted packet successfully but C did not receive packet as Bs transmission range is limited.
Fig 5: Limited Transmission Power Problem in Watchdog Scheme d) Ambiguous Collisions Problem: Ambiguous collisions prevent the nodes from overhearing next node. From the figure 6 [15], it can be observed that collision occurred at node A while it is in a process of overhearing the next node transmissions.
Fig 6: Ambiguous collisions problem in Watchdog scheme The node A will not be able to decide if collision occurred because B forwarded the packet to next node or if B never forwarded the packet and the collision was caused due to some other neighboring node of A (in this case S).
ii)CONFIDANT Protocol: This protocol proposed by Buchegger and Le Boudec[8] is also a reputation-based scheme. It is made up of four components. These components watch their neighbor nodes, rate them, rate the path and also send and receive the alarm messages. The four components of CONFIDANT protocol are: a) The Monitor: Every node in the network continuously monitors the behavior of the node next to it. If any suspicious event is detected, the details of such event are passed to the next component i.e. Reputation System. b) The Reputation System: The rating of the suspected node is modified (either incremented or decremented) based on the details such as frequency of the suspicious event and also significance of such event. c) The Path Manager: When the node rating crosses the predefined threshold the control is passed to this component by the Reputation System. This system then controls the route cache. d) The Trust Manager: This component propagates the alarm message to all the nodes in the network. Limitations of CONFIDANT protocol: The monitor component in this scheme works same as that of the watchdog scheme in which it observes and overhears the next nodes transmission. Hence this scheme also has the same limitations as that faced by the watchdog scheme.
2.3 End-to-End Acknowledgment Schemes There are several schemes that use end-to-end acknowledgments (ACKs) to detect routing misbehavior or malicious nodes in wireless networks. i) 2 ACK SCHEME The watchdog scheme [7][9][10][11][12] suffers from several problems such as ambiguous collisions, receiver collisions, and limited transmission power and false misbehavior report. The major problem is that the successful reception of packets can only be determined at the receiver of the next hop link, but the watchdog scheme only monitors the sender of next hop link. Since the next hop links sender or receiver can be a misbehaving node, therefore it is necessary to detect misbehaving links instead of the misbehaving nodes. The 2ACK scheme proposed by Liu et al.[17] is a network- layer technique to detect misbehaving links. The 2ACK scheme detects misbehavior through using acknowledgment packet namely 2ACK. This packet is sent by a node to two nodes down the line along the route. Fig. 7 illustrates the operation of the 2ACK scheme. From the figure it can be seen that N1, N2, and N3 are three consecutive nodes along the transmission path.
Fig 7: 2ACK schemes International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 61
The routing protocol DSR determines the route from source node S to destination node D in the Route Discovery Phase. N1 sends data packet to N2 and then N2 sends the data packet to N3, but N1 cannot ensure whether N3 receives the data packet or not. This happens even when no nodes in the path are misbehaving nodes. This problem becomes severe when the nodes misbehave in MANETs. Hence to overcome this problem the 2ACK scheme ensures that each node sends an acknowledgement packet two hops down the line along the route in opposite direction i.e. Node N3 on successful reception of data packet must send the acknowledgement 2ACK to N1 via N2. This acknowledgment 2ACK contains ID of the corresponding data packet received by N3. This 2ACK transmission takes place for every set of three nodes. Therefore, only the first node next to source will not send the 2ACK packet and only the last node just before destination & destination node both will not receive the 2ACK packets. Each node in the transmission path maintains the list of IDs of packets that are sent from it for a predefined time say T seconds. If the 2ACK is received within T seconds, then the ID of that packet which is received successfully by third node (node that sends acknowledgement) will be deleted from list at the node receiving 2ACK. Otherwise the ID is deleted from the list after T seconds and failure count will be incremented. The 2ACK scheme overcomes the watchdog scheme limitations as mentioned below: a) Ambiguous Collisions: In watchdog scheme ambiguous collisions may occur at node N1. Sometimes it may be possible that N2 forwards the packet to N3 and still the node N1 cannot overhear N2s transmission due to collision at N1 by other nodes transmission of packet to it. This limitation of watchdog can be solved by 2ACK, where 2ACK scheme insists node N3 to send 2ACK packet to N1. b) Receiver Collisions: In watchdog scheme, N1 forwards packet to N2 and overhears N2s transmission. When N1 learns that N2 forwarded packet to N3 it rests assure that packet is sent, but it may sometimes happen that the data packet may not be received by N3 due to collision at N3. Again, the 2ACK scheme overcomes this problem with the help of acknowledgement packets i.e. 2ACK packets. c) Limited Transmission Power: In MANETs the nodes limit their transmission power to protect their battery from getting drained soon. In the watchdog scheme when a node say N2 limits its transmission power such a way that node N1 can overhear its transmission when data packet is sent from it, but it misbehaves (by limiting its transmission power) such that data can never be reached to N3. 2ACK acknowledgement packet is the solution for such problem. d) Limited Overhearing Range: In MANETs the nodes limit their overhearing range to protect their battery from getting drained soon. In watchdog scheme this may lead to a limitation. Though the node N2 transfers the packet successfully to N3, the node N1 may not be able to overhear the transmission because of its limiting overhearing range. This is again solved by the 2ACK acknowledgement packets. Limitations of 2ACK Scheme: The 2ACK scheme solves the above mentioned problems but at the same time creates network overhead. This overhead is due to the fact that acknowledgement packets are generated for every triplet. ii)TWOACK Scheme: The TWOACK scheme [19] is and End-End acknowledgment scheme which can be implemented on top of any source routing protocol like DSR. This scheme works on the basis of special type of acknowledgment packets called TWOACK packets which are sent back to two hops in the direction opposite to that of the arrival of data packets.
Fig 1: TWOACK Scheme
Figure 1 [19], shows the working of the TWOACK scheme. Suppose that the DSR protocol has discovered a route from source node S to destination node D as [S N1 N2 N3 D]. Now assume node N1 should transfer a data packet to N2, and this packet is to be transferred to node N3, Node N1 has no way to determine whether the packet is delivered to N3 successfully or not. Listening to the next nodes transmission as in overhearing schemes will only lead to determining the nodes transmission but not the reception of packet at next node. Hence it may even result in false reports. The TWOACK scheme is designed to solve these problems: when a node N3 receives a data packet, it sends out a TWOACK packet over two hops back to N1 via N2. The TWOACK packet contains the packet ID of that packet which is received at N3. The backward route i.e. [N3 N2 N1] via which the TWOACK packet is sent is extracted from the data packet which is received at N3 that contains the route of source. The goal of this TWOACK packet is to inform the source i.e. N1 that node N3 received the data packet is received successfully. This procedure is carried out by every three consecutive nodes called as triplets. The TWOACK and 2ACK schemes differ in the following ways: 1) TWOACK packets are sent for every data packet received whereas the 2ACK packets are sent for only fraction of data packets received. Acknowledging only a International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 62
fraction of received data packets yield better performance of 2ACK as this reduces network overhead due to more number of acknowledgement packets compared to TWOACK. 2) The 2ACK scheme uses an authentication mechanism to ensure that the acknowledgement packets are genuine.
iii) The S-TWOACK Scheme The TWOACK scheme results in generating two TWOACK packets for every hop of data packet being forwarded. Each TWOACK packet is a unique one and hence causes congestion in the network. To overcome this problem of network overhead of TWOACK, S-TWOACK (Selective TWOACK) scheme [19] is proposed. Unlike TWOACK scheme, S-TWOACK does not send acknowledgement packet each time a data packet is received. Instead it waits for the reception of certain number of packets and then with a single acknowledgement packet acknowledges all the packets received so far. Limitations of S-TWOACK Scheme: a) It is expensive to avoid the problem of network overhead. b) False-alarm problems. iv) Adaptive Acknowledgement Scheme (AACK): Sheltami et al [12] proposed AACK scheme. This is also an acknowledgement based network layer scheme and it is a combination of two existing schemes such as TWOACK and ACK. AACK scheme could reduce the network overhead but could not improve the network throughput. The figure 7 [15], below shows the ACK scheme.
Fig 7: ACK (An End- End Acknowledgement)
It can be noticed that node S forwards the packet to the destination via the intermediate nodes such as A, B, C and X. The intermediate nodes forward this packet till the destination node receives it. When the destination node receives this packet it in turn sends an acknowledgement packet via all the intermediate nodes down the line to the source in an opposite direction. If the ACK is not received within the predefined time period, then the data transfer between source and destination node is not successful, otherwise it is considered to be successful. If the data transfer is not successful, the source node switches from ACK mode to TACK mode by sending TACK packet. This way of adopting hybrid technique of combining both ACK and TACK scheme results in reduced network overhead. Limitations of AACK Scheme: a) Fails to detect the malicious nodes in the presence of false misbehavior report. b) Fails to detect the malicious nodes in the presence of forged acknowledgement packets.
v) EAACK- Enhanced Adaptive Acknowledgement: This is also an acknowledgement based scheme. This scheme was proposed by Elhadi M. Shakshuki et al. [15] All the end-end acknowledgement schemes deal with acknowledgement packets which need to be authenticated. EAACK consists three major parts: End End Acknowledgement Scheme (ACK) Secured Acknowledgement Scheme (S- ACK) Misbehavior Report Authentication (MRA) a) ACK Scheme ACK is an end-to-end acknowledgment scheme which is part of hybrid scheme of EAACK. ACK aims at reducing the network overhead caused due to acknowledgement packets.
Fig 8: ACK scheme
Fig. 8 [15], illustrates the operational details of ACK mode, node S forwards a data packet P ad1 to destination node D. All the nodes in the transmission path collaboratively work to forward the data packets to D. On successful reception of data packet P ad1 , the destination node D responds back to source node by sending it an acknowledgement packet P ak1 in the opposite direction. If the source node receives the acknowledgement packet within the time set before the data transfer between source and destination is considered to be successful. Otherwise the source node switches itself to the S-ACK mode by forwarding an SACK packet to detect the misbehaving nodes in the transmission path.
b) S- ACK mode: The S-ACK scheme as proposed by Liu et al. [17] is an improved version of the TWOACK scheme. The goal of SACK scheme is to let every three consecutive nodes i.e. every triplet to actively participate in identifying the misbehaving nodes. The third node in the triplet has to send an S-ACK acknowledgement packet back to the node that is two hops away from it in opposite direction. International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 63
Fig 9: S-ACK mode
Fig 9 shows the operational details of S-ACK mode. Suppose that the data need to be transferred from the source node S to destination node D. Consider the three consecutive nodes (say A, B, and C) as intermediate nodes in the path from S to D. These nodes work collaboratively to detect the misbehaving nodes in the network. Node A forwards the S-ACK data packet P sad1 to the node B, Node B in turn forwards the same to node C. As node C is the third node in the triplet, on successful reception of this SACK packet, the node C now needs to send the S-ACK acknowledgement packet P sack1 back to the first node in the triplet i.e A via B in an opposite direction. If the first node in the triplet does not receive the S-ACK acknowledgement packet P sack1 in the predefined time period node A reports both B and C as malicious nodes. Therefore node A generates a misbehavior report and sends to node S which is source node. The difference between TWOACK [19] scheme and EAACK [15] is that in the former a source node trusts the misbehavior report even in case of false misbehavior report. Whereas in EAACK the source node on receipt of misbehavior report switches to MRA mode, and verifies if the received misbehavior report is true or false. The S- ACK scheme was introduced in order to detect the misbehaving nodes even in the presence of receiver collisions or limited transmission power. c) MRA The overhearing techniques discussed in the Reputation Based Schemes fail to detect misbehaving nodes with the presence of false misbehavior report. The false misbehavior reports are the ones which are generated by malicious nodes in order to falsely report the innocent node as a malicious node. This causes a severe problem when the attackers try to divide the network into parts attacking nodes in it. When a node sends a false misbehavior report to the source node indicating loss of some packet, the source node instead of trusting this report sends an MRA packet via some alternative path to the destination. This alternative route is chosen from its local knowledge base, if the alternative path is not available Dynamic Source Routing is used to determine new route between source and destination. The destination node now compares the packet ID mentioned in MRA packet and the packet IDs of its local knowledge base. If a match is found it, then the destination node acknowledges back the source node indicating that the packet said to be lost is actually received by it. Otherwise the source will conclude that the report received is a false one and hence marks the reporter as the malicious node.
Fig 9: Flowchart of operational details of EAACK components
The figure 9 [15] shows the flow of control between the three parts of EAACK. d) Digital Signatures EAACK is an End - End Acknowledgment scheme i.e. all the above discussed components of EAACK operate based on acknowledgement packets. Using these packets the EAACK components identify the misbehavior nodes. It may even happen such that these packets might be forged. Hence it is necessary to ensure that these packets are authentic. EAACK uses an additional methodology such as Digital Signature Algorithm (DSA) [20] and RSA [20] digital signature schemes to digitally sign the acknowledgement packets.
3.CONCLUSION With the increasing use and demand of MANETs, security of MANETs has become the major concern. Prevention alone is not the solution for this; hence Intrusion Detection Systems have come into focus. Various existing IDS were discussed in this paper. Every IDS has its own limitations. The EAACK scheme proposed by Elhadi et al. in [15] successfully detects the malicious nodes in conditions such as False Misbehavior Report and secures the acknowledgement packets. Digital Signatures are used to digitally sign the Acknowledgement packets.
REFERENCES [1] H. Miranda and L. Rodrigues, Preventing Selfishness in Open Mobile Ad Hoc Networks, Proc. Seventh CaberNet Radicals Workshop, Oct. 2002. International Journal of EmergingTrends & Technology in Computer Science(IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 3, Issue 3, May June 2014 ISSN 2278-6856
Volume 3, Issue 3 May June 2014 Page 64
[2] L.M. Feeney and M. Nilsson, Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment, Proc. IEEE INFOCOM, 2001. [3] L. Buttyan and J.-P. Hubaux, Enforcing Service Availability in Mobile Ad-Hoc WANs, Proc. MobiHoc, Aug. 2000. [4] J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project, IEEE Comm. Magazine, Jan. 2001. [5] L. Buttyan and J.-P. Hubaux, Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks, ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, 2003. [6] M. Jakobsson, J.-P. Hubaux, and L. Buttyan, A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks, Proc. Financial Cryptography Conf., Jan. 2003. [7] S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. MobiCom, Aug. 2000. [8] S. Buchegger and J.-Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,Proc. MobiHoc, June 2002. [9] J.-S. Lee, A Petri net design of command filters for semiautonomous mobile sensor networks, IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 18351841, Apr. 2008. [10] J. Parker, J. Undercoffer, J . Pinkston, and A. Joshi, On intrusion detection and response for mobile ad hoc networks, in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747752. [11] A. Patcha and A. Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, in Proc. Radio Wireless Conf., 2003, pp. 7578. [12] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence ofmisbehaving nodes inMANETs, Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273282, Oct. 2009. [13] Charlie Obimbo#1, Liliana Maria Arboleda-Cobo*2 An Intrusion Detection System for MANET Communications in Information Science and Management Engineering(CISME) Vol.2 No.3 2012 PP.1-5 www.jcisme.org 2011-2012 World Academic Publishing. [14] Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mo- biCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255_265, New York, NY, USA, 2000. ACM. [15] Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE, EAACKA Secure Intrusion-Detection System for MANETs IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013 [16] Hasswa, A., Zulkernine, M., and Hassanein, H. Routeguard: an intrusion detection and response system for mobile ad hoc networks. In Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), volume 3, pages 336_343. IEEE, August 2005. [17] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An acknowledgment-based approach for the detection of routing misbehavior in MANETs, IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536550, May 2007. [18] L. Zhou and Z.J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999. [19] K. Balakrishnan, J. Deng, and P.K. Varshney, TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks, Proc. IEEE Wireless Comm. and Networking Conf. (WCNC 05), Mar. 2005. [20] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp. 120126, Feb. 1983.
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications