A Mobile Ad Hoc Network is a self-configuring network and they are very impressive for army infrastructures in aggressive battlefield environments. In such conditions, the capability to interconnect secret information effectively in the existence of attacker is very tough. Attackers may challenge both passive and active type of attacks in addition to non-authorized access to categorize, adjust or disturb the information process. Nodes generally share the same physical media; they transmit signals and acquire them at the same occurrence band. This paper put light on various security threats and their hazards in mobile ad-hoc networks.
Ad-hoc networks, attacks, protocols.