International Journal of Scientific & Engineering Research Volume 2, Issue 9, September-2011 1 ISSN 2229-5518 IJSER © 2011 http://www.ijser.org Privacy Anxiety and Challenges in Mobile Ad Hoc Wireless Networks and its Solution Krishan Kant Lavania, G. L. Saini, Kothari Rooshabh H., Yagnik Harshraj A. AbstractMobile Ad hoc networks are recent wireless networking model for cellular phone hosts. Ad hoc networks do not rely on any stable infrastructure because they are independent. As an alternative, to remain network connected hosts rely on each other. It signifies complex distributed systems that encompass wireless mobile nodes. These nodes can freely and dynamically self-organize into uninformed and provisional, ‘‘ad-hoc’’ network topologies. This topology allows citizens to effortlessly interconnect in areas where no pre- existing communication infrastructure. In this paper, we talk about security issues, challenges and their solutions in the mobile ad hoc network. There are numerous security threats that disturb the development of mobile ad hoc network because of the exposed nature of the mobile ad hoc network. We have first studied the prime vulnerabilities in the mobile ad hoc networks, which have made our work much easier to endure from attacks than the usual wired network. The security criteria of the mobile ad hoc network and the main attack types that exist are explained in this paper. As a final point we analyzed the recent security solutions for the mobile ad hoc network [1]. Index TermsMinimum 7 keywords are mandatory, Keywords should closely reflect the topic and should optimally characterize the paper. Use about four key words or phrases in alphabetical order, separated by commas. —————————— —————————— 1 INTRODUCTION An ad hoc network is a set of wireless mobile nodes that forms a momentary network with no central organization. In this situation, it may be essential for one mobile node to enroll other hosts for forwarding a packet from source node to its destination node due to the restricted transmission range of wireless network interfaces. Each mobile node op- erates as a router for forwarding packets for many other mobile nodes in the network that may not have direct communication range of each other. To discover multihop paths through network each node participates with other node in an ad hoc routing protocol. This proposal of Mobile ad hoc network is also called infrastructure less networking [2]. Ad hoc networks have a unique set of challenges and prob- lems, although mobile ad hoc networks have numerous ad- vantages over the traditional wired networks. For example the supply constraints on nodes in ad hoc networks bound the cryptographic procedures that are used for secure mes- sages. That’s why it is legally responsible to fix attacks rang- ing from passive masquerade to active masquerade. Second- ly, mobile nodes with no enough protection are easy to con- ciliation. An attacker can listen, modify and attempt to cover- up all the traffic on the wireless communication channel as one of the valid node in the network. Thirdly, in provisions of security solution and for the vigorously changing topolo- gy static configuration is not sufficient. In conclusion, defi- ciency of cooperation and guarded ability is common in wireless MANET. In universal, due to its fundamental uni- queness of the wireless MANET, it is vulnerable. A MANET Example Fig. Shows MANET Example 2 MANET CONCEPT A mobile ad hoc network is a set of wireless nodes that can dynamically be set up at everyplace and anytime without using any pre-existing network infrastructure. It is an self- sufficient system in which mobile hosts connected by wire- less links. They are free to move randomly and often oper- ate as routers at the same time. The traffic types in ad hoc