In mobile ad-hoc networks (MANET), network security problems emerge in an endless stream. For example, malicious nodes may become immediate nodes of routing paths first by replying spoof routing information. Then data packets might be stolen, modified, an