International Journal of Computer Applications
The feasibility of Mobile Ad-hoc NETworks (MANETs) is gaining popularity widely. Due to its fundamental characteristics like dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth, these networks are more prone to malicious attacks. The prevention methods like encryption and cryptography are not sufficient to make them secure. The reason behind this is that these techniques focus on how to protect the data but do not take any action against the intruder. Therefore some detection mechanism must be deployed to facilitate the identification and isolation of attacks before an attacker breaches the system.