International Journal of Computer Applications
Mobile ad-hoc networking has become an exciting and important technology in recent year because of the rapid proliferation of wireless devices. The security of data becomes more important with the increased use of commercial application over wireless network environments; there were several problems of security in wireless networks due to different types of attack and intruders. There were better methods an intruding handling procedure available for fixed networks. But it was difficult to analyze attacks in the mobile ad-hoc environments. The reason is that there is no central point to control all the activities in the network and dynamically changing network topology and behavior and limited power level of mobile devices.