Date Added: Oct 2012
Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and auto-configuration problems. However, there is a little progress in solving the secure auto-configuration problems in Mobile Ad hoc NETworks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.