Date Added: Dec 2011
In this paper, the authors present an overview of Ad hoc network that uses mobile nodes to enable communication outside wireless transmission range. They briefly describe the ad-hoc routing protocols, the attackers, attacks by the attackers and some suggestions and solution for secure routing protocols that follow the table driven and on-demand approaches. With the advances of wireless communication technology, low-cost and powerful wireless transceivers are widely used in mobile applications. Mobile networks have attracted significant interests in recent years because of their improved flexibility and reduced costs.