International Journals of Advanced Information Science and Technology (IJAIST)
A survey of MANET plays an major role in data communications. The node can be formed automatically without any centralized infrastructure, even though the nodes are formed automatically the replication of data to the node's are unavoidable. In single point attack that brings the whole network down and corrupted. An adversary can easily attack analyze the clone of unshielded sensor nodes and create replicas and insert them in the network. This gives the adversary to create on a large class of several insidious attack like disrupting communication, subverting, data aggregation, eavesdropping, deny of services, clone it etc.