Abstract
Ad-hoc networks are quite popular for especially on networks network (MANETs, IoT, VANETs, and so forth.), identification &mitigation procedures are only functioning after the attack was initiated Prevention, however, attempts of an attack can be monitored before it is executed. This survey gives us knowledge about how attacks are been analyzed with this two strategies can be acknowledged either by the aggregate collaboration of network nodes or by internal detection of the attack state. It also shows the method for minimizing the gray-hole DoS attack and how to reduce the count of number of packets been dropped. Our survey gives an answer for no explicit node collaboration, with every node utilizing just internal knowledge picked up by routine routing information. This also shows the benefits of the different techniques threat models for better understanding of the attack surface and its prevention. We recognize their respective motivations and distinguish their advantages and drawbacks in a comparative survey.