Professional Documents
Culture Documents
Index Terms—Vehicular Ad hoc Network, Network Security, Road Side Unit, Cooperative Hybrid Intrusion Detection System, Solar Energy
Harvesting, Power Management.
I. INTRODUCTION
Many research works suggest that there is an actual need for a VANET infrastructure, which consists of various types of fixed
nodes performing different actions according to VANET applications demands. An important class of these nodes are Road Side
Units (RSUs)[1,2]. Due to power supply requirements, it was recommended to localize RSUs nearer to wired electricity sources,
such as traffic lights[1,2]. However, such placement limits the area covered by the RSUs and thus their services. In order to
overcome this restriction, it is required to establish self powered RSUs. In our previous work [3], we suggest that a RSU can
harvest the energy needed for its work from the surrounding environment, especially solar energy. Such a suggestion permits to
install RSUs in any place without considering the power supply availability and hence, extensive area can be covered by the
VANET infrastructure. We also suggest that these RSUs would create an ad hoc network in order to assist each other to deliver
data packets to their destinations, that's why an ad hoc infrastructure is needed. Each RSU is responsible for providing different
VANET services to the vehicles in a certain area of the city, ranging from traffic safety and road monitoring services to Internet
access & entertainment services. RSUs, as a part of the VANET infrastructure, receive different packets from vehicles (vehicle
status or Internet access request), then forward them to the VANET server via the ad hoc network. As a member in the ad hoc
network, a RSU also behaves as a router which delivers other RSUs traffic to their destinations, see Fig.1 .
In order to implement a functional and efficient solar energy powered RSU, the embedded UBICOM IP2022 platform was chosen
to implement the proposed RSU. The heart of the harvesting module is the harvesting circuit, which draws power from the solar
panels (4-4.0-100 solar panels from Solar World Inc), handles energy storage (2800 mAh, AA battery pairs), and routes the power
to the intended system, see Fig.1. A DC-DC converter is used to provide a constant supply voltage to the embedded system and
we used Texas Instruments TPS63000 low power boost-buck DC-DC converter to achieve this goal [3].
From the above discussion, it is clear that the RSU plays a major role in the proposed green VANET infrastructure and hence, the
security of this device must be a priority [4,5]. The RSUs are subjected to a plethora of network traffic conditions and security
attacks, which can seriously affect their integrity, performance and power consumption and hence their availability. So our efforts
in this paper focus on the definition of a multitude of security methods to protect the RSUs (in particular) and the VANET (in
general) against these threats.
Fig.1 The suggested solar energy harvested RSU
II.LITERATURE REVIEW
This section presents a survey on the existing research works on the IDS functionality in an Ad hoc wireless networks which had
spanned and covered a wide research area. Since the nature of the ad hoc networks is distributed and requires the cooperation of
other nodes, many previous works [6-13] have proposed that the intrusion detection in such networks should also be both
distributed and cooperative. Every node contributes in the intrusion detection and response by having an IDS agent running on
them. An IDS agent is in charge of distinguishing and gathering the local events and data to identify the probable intrusions, as
well as initiating a reply separately. However, the neighboring IDS agents cooperatively partake in the global intrusion detection
actions when the evidence is uncertain. On the other hand, some papers [14,15] suggest enhancing the ability of an IDS to detect
the various types of attacks, under different conditions, by modifying its internal architecture. Through combining more than one
type of IDS strategies, which is so widely called the Hybrid-IDS, intrusions detection task would be more efficient and precious.
Many papers dealt with the building of different IDS approaches against specific types of ad hoc networks attacks [16-24]. These
behavioral based IDSs, try to identify the activities of certain types of attacks by comparing their behavior against previously
defined models (an in depth comparison among the different IDS methods can be seen in Table 1). Finally, some research works
focus on employing the reputation and trustfully based verification methods in order to categorize the different nodes in the
VANET[25-28].
Although the majority of the mentioned references give various IDS solutions for the Ad hoc networking environment, they do
not take into consideration the realization issues of their thoughts on real platforms, especially embedded systems. Even though,
our previous works in [29,30] study the implementation challenges of inserting an IDS functionality into an embedded platform,
the contribution was limited to a cooperative IDS energized by the traditional wire power resources. Our efforts in this paper
focus on answering some questions regarding the implementation of a Cooperative-Hybrid IDS into a renewable energy
dependent embedded system, questions such as:
1. Is it possible to implement such a sophisticated system into a resources limited platform?
2. What do we need to ensure the successful combination of the different security methods, algorithms and techniques with solar
energy powered system?
3. What are the assessment of the whole system in terms of its network performance, practicability, power consumption and
immunity against the different threats?
TABLE 1 A COMPARISION OF DIFFERENT IDS IMPLEMENTATIONS
Response
Unit
(b)
Fig.3 Cooperative-Hybrid IDS (a) Cooperative IDSFunctionality (b) Hybrid IDS Architecture
V.
“Local Cluster(s) - RSU(s) Failure” State “Local Cluster(s) - VCS Failure’ State
“Local VCS – After Being Repaired” Procedure
(b)
CS
The CS receives the different periodic reports and the RSUs archival settings from the different cluster servers
The CS Checks the availability of the VCS(s) via the periodic polling
REPORTING
Local VCS
The local VCS Performs the periodic reporting and archiving procedure with the CS
The VCS Cooperates with the RSUs to offer the VANET services
The VCS checks the availability of its associated RSUs
G-RSU
N-RSU
The G-RSU cooperates with the local VCS to offer the VANET services
The G-RSU starts the network discovery procedure
The N-RSU cooperates with the local VCS to offer the VANET servi
The G-RSU begins the handshaking and mutual authentication procedure with the foreign G-RSU(s) The N-RSU monitors the availability of its local VCS
VANET
DATA EXCHANGE
RSU
The RSU cooperates with the local VCS to offer the VANET services
(c)
Foreign VCS
IF an “invite new RSUs” alert is received from the CS THEN
The foreign VCS receives the RSUs archival settings from the CS
The foreign VCS sends individual “invite new RSUs” packets to multiple RSUs via the G-RSU(s) pair(s)
IF a legal “RSU accept” response is received from the invited RSU THEN the foreign VCS accepts this RSU in its cluster and informs the CS via the “invited RSU(s) status” report
ELSEIF an illegal “RSU accept” response is received THEN the foreign VCS ignores this response
ELSEIF a legal “RSU accept” response was not received within a certain time threshold THEN CS
The foreign VCS sends another invitation packet
IF a certain with a certain
time threshold re-invitewithout
is exceeded attempts
thelimit
reception of periodic reports from certain VCS(s) THEN CS sends status enquiry to this particular VCS (via Polling)
IF the re-invite attempts limit is exceeded THEN
IF the CS the foreign
receives VCS from
no response sendsthis
an “RSU(s)
particularNot
VCSAvailable”
THEN alert to inform the CS via the “invited RSU(s) status” report
ENDIF The CS considers this particular VCS as Not Available
(2) Invite new RSUs ENDIF The CS allocates the RSUs of this particular cluster to(1) other VCS(s)
Invite new RSUs
ENDIF The CS sends an “invite new RSUs” alert to another VCS(s)
The CS sends RSUs archival settings to the chosen VCS(s)
ENDIF
IF “Invited RSU Not Available” alerts are received from a VCS via the “Invited RSU(s) Status” report THEN the CS allocates this particular RSU to another VCS(s)
ENDIF
ENDIF
NO RESPONSE
G-RSU
hange the data packets with its paired G-RSU(s) VANET Cluster
IF an ”Local VCS Not Available” G-RSU
alarm is received from a N-RSU THEN the G-RSU suspends the reporting and waits for an invitation packet from another VCS via its pair
IF a legal “invite new RSUs” packet is received from a foreign VCS THEN the G-RSU forwards the invitation to other RSU(s)POLLING
the G-RSU sends a “RSU accept” response to the sender VCS and joins a new VANET cluster
ELSE
Local VCS
(6) RSU(s) responses RSU rejects the invitation and waits for another
ENDIF
NOT AVAILABLE
ENDIF (FAILED)
G-RSU receives and forwards the responses of the invited RSU(s)
(d)
Foreign VCS
IF an “release RSU(s)” alert is received from the CS THEN CS
(2) release RSU(s)
The foreign VCS sends a “release RSU(s)” Command to these RSUs IF the CS receives an “Local VCS Available again” alert from previously an unavailable VCS THEN
(1) ReleaseCSRSU(s)
The foreign VCS receives ”RSU(s) Released” reports from the differentThe
RSUs re- allocates the RSUs of this particular cluster
The foreign VCS informs the CS via the ”RSU(s) Released” report The CS sends an “release RSU(s)” alert to the foreign VCS(s)
IF a ”RSU(s) Released” report is received from the foreign VCS(s) THEN
ENDIF The CS sends an “Re-invite RSUs” alert to the local VCS
The CS sends back the RSUs archival settings to the local VCS
The CS
(8) RSU(s) Released receives a “Local Cluster Report” from the local VCS
Report
ENDIF
ENDIF
RSU N-RSU
IF a legal ”release RSU” command is received from the foreign VCS THEN IF a legal ”release RSU” command is received from the foreign VCS THEN
The RSU sends a “RSU Released” response to the foreign VCS The N-RSU sends a “RSU Released” response to the foreign VCS
The RSU suspends reporting and waits for an invitation packet from the repaired local
TheVCS
N-RSU suspends reporting and waits for an invitation packet from the repaired local VCS
ELSE the RSU rejects the command ELSE The N-RSU rejects the command
IF a legal “Invite RSU” packet is received from the repaired VCS THEN IF a legal “Invite RSU” packet is received from the repaired VCS THEN
The RSU sends a “RSU accept” response to the local VCS The N-RSU sends a “RSU accept” response to the local VCS
The RSU re-joins the repaired VANET cluster The N-RSU re-joins the repaired VANET cluster
ELSE ELSE
The RSU rejects the invitation and waits for another The N-RSU rejects the invitation and waits for another
ENDIF ENDIF
ENDIF ENDIF
(e)
CS
an “Local RSU(s) Not Available” alert is received from a local VCS via reporting THEN Maintenance Unit
0 The CS generates an “RSU(s) Maintenance Required” alarm to inform the maintenance unit RSU(s) Maintenance Required
a “RSU(s) Maintenance Report” is received from the maintenance unit THEN the CS informs the associated VCS(s) via the “RSU(s) Maintenance Report” IF a “RSU(s) Maintenance Required’ alert is received from the CS THEN
DIF The Maintenance Team performs the necessary maintenance proce
NDIF
ENDIF
an “All G-RSU(s) Not Available” alert is received from a VCS THEN
e CS suspends RSUs invitation requests between these clusters
OTO 20
DIF
RSU(s) Maintenance Report
VANET Cluster
RSU(s) Maintenance Report
Local VCS
The VCS checks the availability of its associated RSUs and performs the necessary reporting
IF no response is received from certain {RSU(s), N-RSU(s) or G-RSU(s)} THEN an “Local RSU(s) Not Available” alert is sent to inform the CS
IF a “RSU(s) Maintenance Report” is received from the CS THEN
GOTO 10
ENDIF
ENDIF
IF no responses are received from ALL the G-RSU(s) THEN
The VCS sends an “All G-RSU(s) Not Available” alert to the CS
ENDIF
G-RSU
Local VCS checks the availability of the different RSUs in its cluster N-RSU
The G-RSU cooperates with the local VCS to offer the VANET services The N-RSU cooperates with the local VCS to offer the VANET services
The G-RSU starts the network discovery procedure The N-RSU monitors the availability of its local VCS
The G-RSU begins the handshaking and mutual authentication procedure with the foreign G-RSU(s)
RSU
The RSU cooperates with the local VCS to offer the VANET services
(f)
(g)
Fig.8 Securing Cooperative IDS Transactions (a) VANET clustering diagram (b)State Diagram of VANET Clustering (c) Local
Cluster-Normal Operation State (d) VCS Failure Recovery Procedure (e) Local VCS – After Being Repaired Procedure (f)
RSU(s) Failure Recovery Procedure (g) PRNG pairs in VANET server and RSUs
The goal of the second experiment is to discover the network activities of a typical VANET infrastructure and hence, the power
consumption of the proposed RSU under realistic road traffic conditions. In order to feed the experimental test bed with truthful
values, a simulation model was built using the Network Simulation package. The goal of building this model is to generate a
traffic patterns as close as possible to the real situations. Our network represents a VANET cluster of 40 RSU covering (25 Km 2)
area of a typical city. It was assumed that the vehicles broadcast their 100 byte status packets each one second[3], while the
RSUs generate their 1000 byte traffic report 10 times per minute and forward them to the VANET server [3]. According to our
earlier analysis in [38], Optimized Link State Routing (OLSR) protocol gives the best performance compared to the other ad hoc
routing protocols when working in a non-stationary ad hoc topology, so that it was adopted in our simulation model. The OLSR
mechanisms are regulated by a set of parameters predefined in the OLSR RFC 3626 [4] standard and it was adopted in our
simulation model, see Table 8. In order to simplify the simulation model, the RSUs were assumed to be identical and subjected
to the same road traffic conditions. The different network traffic patterns generated from running the previous simulation model
(listed in Table 8) represent the baseline VANET model, i.e., without the intervention of any attack or the functionality of the
suggested ECHIDS.
TABLE 8 SIMULATION MODEL PARAMETERS, NETWORK TRAFFIC & AVERAGE DRAINED CURRENT VALUES
The aim of the next experiment is to measure the effect of the cooperative signature (SNORT) based IDS functionality on the
network traffic and hence, the RSU power consumption. The test bed was fed with the simulation model outcomes (the RSU
In/Out network traffic) while changing both the rules update file size (number of rules) and the signatures update interval. The
results obtained from performing these tests can be shown in Fig.10a & Fig.10b. Increasing the file size while decreasing the
update interval creates more network load and hence more power is consumed due to the increment in the transmission/reception
operations. It is worth to mention that when using a fully charged 2800 mAh AA battery, a RSU can works for 27 hour under the
VANET baseline traffic pattern, however, the battery life was decreased to 26.5 hour when the update file size was chosen to be
(40 Kbyte) with a (10 Minute) update interval (highest extra traffic case). In the real world implementation, we recommend the
file size to be (20 Kbyte) with a (30 Minute) update interval which is a good compromise between a RSU invulnerability and its
power consumption. Finally, It is worth to mention that an additional RSUs’ CPU utilization (due to the additional IDSs’ tasks)
was observed to be ranged between (5%-15%) according to the update file size.
The effect of the Black hole attack on the RSU power consumption and hence its battery life is described in this experiment. At
this point, two variables were changed: the percentage of a RSUs’ traffic dropped by its neighbors (due to the Black Hole attack)
and the number of the retransmission attempts made by the RSU to compensate this dropping. Fig. 10c shows the destructive
effect of such attack on the drained current and hence the battery life of the RSU as listed in Table 9. These measurements
confirm the importance of our earlier procedure to cope against this type of attack using the suggested Behavioral based IDS.
In this context, we also investigated the degradation in the battery life caused by the energy intensive “promiscuous packet
capturing” task which is needed to perform the suggested defense against the Black Hole attack. Fig. 10d shows that as this mode
of operation includes the reception of an additional network traffic from the neighbored RSUs, more energy is consumed to
achieve this mission. However, including this task into the power budget planning procedure puts its consumed power within the
predetermined energy utilization limits and guarantees a longer battery life.
The purpose of the last experiment is to examine the ability of the suggested power management method to adapt against the
different working conditions (wherein different Available Energy (AE) levels were assumed) and to defend against unmanaged
network traffic conditions (such as those resulting from the Energy Exhaustive Attack). Fig 10e shows that the suggested power
management technique was able to defend against the different DoS traffic profiles and to adapt its performance according to the
available energy levels and hence continue to function in a pre-managed and planned manner which extends the battery life of
the proposed RSU.
(a)
(b)
(c)
(d)
(e)
Fig. 10 The Experimental Results (a) Effect of varying update file size and update interval on RSU traffic (b) Effect of varying update file size and update
interval on RSU drained current (c) Effect of Black Hole Attack on RSUs’ Drained Current (d) Effect of promiscuous packet capturing mode on battery life
(e) RSU Battery life according to different DoS attack rates
In this paper, different intrusion detection methods were suggested to protect solar energy harvested Road Side Units (RSUs)
against various types of internal and external threats. The proposed defense strategies took into account the embedded nature of
an RSU and hence the recommended solutions make a compromise between a highly secured and a good performed system. To
the best of our knowledge, the combination of such security methods, algorithms and techniques with a solar energy powered
system, was not discussed before in any previous works. Although these methods were implemented to serve the VANET
security, it can be slightly modified to be used with other systems such as Mobile Ad hoc Networks (MANETs) and Wireless
Sensor Networks (WSNs). Our future research work will follow different directions in order to fill the gap in this field. We will
make use of our experimental network to study the effect of the other attacks and the defense strategies against them on the
VANET performance in all aspects, especially the power consumption of its nodes. The second step is to propose a secure and
green Ad hoc routing protocol so that the power management and the security techniques will be taken into consideration in the
earlier design stages.
REFERENCES
[1] T. Wu, W. Liao and C. Chang, , "A Cost-Effective Strategy for Road-Side Unit Placement in Vehicular Networks", IEEE Transactions On Communications,
Vol. 60, No. 8, August 2012.
[2] J. Barrachina, P. Garrido, M. Fogue, F. J. Martinez, J. Cano, P. Manzoni, "Road Side Unit Deployment: A Density-Based Approach, IEEE Intelligent
transportation systems magazine, 2013.
[3] Q. I. Ali, " Design, Implementation & Optimization of an Energy Harvesting System for VANETS' Road Side Units(RSU)", IET Intelligent Transportation
Systems, Vol.8, Issue3, 2014.
[4] Q. I. Ali, ”Security Issues of Solar Energy Harvesting Road Side Unit (RSU)”, IJEEE Journal, Vol.11 No.1, 2015.
[5] I. Filippini, F. Malandrino, M. Cesana, C. Casetti, I. Marsh, "Non-cooperative RSU Deployment in Vehicular Networks", WONS Conf., 2012.
[6] S.Buchgger and J. Le Boudec, “ Performance analysis of the CONFIDANT protocol” in proc IEEE/ACM Workshop on Mobil Ad Hoc Networking and
computing (MobiHoc’02), Lausannne, Switzeland, June 2002. PP.226-336.
[7] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks,” 6th Int’l. Conf. Mobile Comp. and Net. Aug. 2000, pp. 275–283.
[8] P. Michiardi and R. Molva, “ Core A Collaborative Reputation Mechanism To Enforce Node Cooperation In MANET,” Communication and multimedia
Security Conference (CMCS’02) Sepember 2002.
[9] N. Nasser and Y. Chen, Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad hoc Networks, ICC 2007Conference, 2007.
[10] Y. Huang, and W. Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks. 1st ACM Workshop Security of Ad Hoc and Sensor Networks,
Fairfax, VA, ACM Press, 2003.
[11] O. Kachirski and R. Guha, Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. 36th Annual Hawaii International Conference
on System Sciences, IEEE Computer Society, 2003.
[12] C. Krügel and T. Toth , Flexible, Mobile Agent based Intrusion Detection for Dynamic Networks. European Wireless, 2002
[13] K. Xiao, et al. ,A Novel Peer-to-Peer Intrusion Detection System Using Mobile Agents in MANETs, 6th International Conference on Parallel and Distributed
Computing, Applications and Technologies, 2005.
[14] J. Gómez, C. Gil, N. Padilla, R. Baños, and C. Jiménez, Design of a Snort-Based Hybrid Intrusion Detection System, IWANN 2009, 2009.
[15] M. Ali Aydın , A. Halim Zaim, K. Gokhan Ceylan, A hybrid intrusion detection system design for computer network security, Computers and Electrical
Engineering Journal, Vol. 35, 2009.
[16] S. Marti, T.J. Giuli, K. Lai et M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, In Proceedings of the Sixth Annual ACM/IEEE
International Conference on Mobile Computing and Networking, p. 255-265, 2000.
[17] H. Kaur , S. Batish and A.Kakaria, An approach to detect the wormhole attack in vehicular ad hoc network in: International journal of smart sensors and ad
hoc networks,4,2012.
[18] A. Sinha, S.K. Mishra, Preventing VANET From DOS & DDOS Attack, International Journal of Engineering Trends and Technology (IJETT) – Volume 4
Issue 10- Oct 2013.
[19] M. Erritali, B. El Ouahidi, A Survey on VANET Intrusion Detection Systems, Proceedings of the 2013 International Conference on Systems, Control, Signal
Processing and Informatics, 2013.
[20] S. Sharma , M. Sisodia. ”Network Intrusion Detection By using Supervised and Unsupervised Machine Learning Techniques: A Survey". International Journal
of Computer Technology and Electronics Engineering. 2011.
[21] N. meyer, J. Njeukam, J. Petit, and K. M. Bayarou, “Central misbehavior evaluation for VANETs based on mobility data plausibility,” in Proceedings of the
ninth ACM international workshop on Vehicular inter-networking, systems, and applications - VANET ’12, New York, USA: ACM Press 2012.
[22] J. Grover, V. Laxmi, and M. Gaur, “Misbehavior detection based on ensemble learning in vanet,” in Advanced Computing, Networking and Security, ser.
Lecture Notes in Computer Science, Eds. Springer Berlin / Heidelberg, vol. 7135, 2012.
[23] S.Chang, Y.Qi, H.Zhu, J.Zhao, and X.Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks”, IEEE Trans. Parallel and Distributed Systems,
vol.23, June. 2012.
[24] M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, “Sybil Nodes Detection Based on Received Signal Strength Variations within Vanet,”, Int’l J.
Network Security, vol. 9, no. 1, 2009.
[25] J. Roman, “Trust and Reputation Systems for Wireless Sensor Networks”, Troubador Publishing, 2009.
[26] C. Liao, J. Chang, I. Lee, K. Venkatasubramanian, “A trust model for vehicular network-based incident reports”, 2013 IEEE 5th International Symposium on
Wireless Vehicular Communications (WiVeC), Dresden, 2013.
[27] J. Zhang, “ A Survey On Trust Management For Vanets”, 2011 IEEE International Conference on Advanced Information Networking and Applications
(AINA), Biopolis, 2013.
[28] M. Gerlach, “Trust for Vehicular Applications”, Eighth International Symposium on Autonomous Decentralized Systems (ISADS '07), Sedona, 2007.
[29] Q. I. Ali, S. Lazim, E. Fathi, “Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems”, IJEEE Journal, Vol.8 No.1, 2012.
[30] Q. I. Ali, S. Lazim "Design & Implementation of an embedded Intrusion Detection System for Wireless Applications", IET Information Security Journal,
Vol.6, Issue 3,2012.
[31] R. Yasdi, Prediction of Road Traffic using a Neural Network Approach, Neural Comput & Applic (1999)8:135–142.
[32] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th annual international
conference on Mobile Computing and Networking (MobiCom ’00), 2000, pp. 255–265.
[33] Z. Wang, L. Liu, M. Zhou, N. Ansari, “A Position-Based Clustering Technique for Ad Hoc Intervehicle Communication”, IEEE Transactions On Systems, Man,
And Cybernetics—Part C: Applications And Reviews, Vol. 38, No. 2, March 2008.
[34] L. Zhang, H. Elsayed and E. Barka, “A Novel Location Service Protocol in Multi-Hop Clustering Vehicular Ad Hoc Networks”, In: proc. of International
Conference on Innovations in Information Technology (IIT), 386-391, 2011.
[35] M. Raya and Jean-Pierre Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security 15 (2007) 39–68 39.
[36] G. Samara, W.A.H. Al-Salihy, and R. Sures. Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET). in 4th International Conference on
New Trends in Information Science and Service Science (NISS), 2010 .
[37] L. Blum, M. Blum, and M. Shub, A simple unpredictable pseudorandom number generator, SIAM J. Comput., 15(2):364–383, 1986.
[38] Q. I. Ali, F. Faher, "Evaluation of Routing Protocols of Wireless Ad Hoc for SCADA Systems Using OPNET Simulator", 2 nd Scientific & Engineering
Conference, 2013.
[39] R. Singh, J. Singh, “A Performance Metrics Scorecard Based Approach to Intrusion Detection System Evaluation for Wireless Network”, Global Journal of
Computer Science and Technology Network, Web & Security, Volume 12 Issue 12, 2012.
[40] G. A. Fink, B. L. Chappell, T. G. Turner, and K. F. O’Donoghue, “A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-
Time Systems”, WPDRTS conference, 2002.