The document discusses security challenges and attacks in mobile ad hoc networks (MANETs) along with solutions. It describes various active and passive attacks at different layers of the network including physical, link, network, transport and application layers. It also discusses secure routing protocols that use routing header information, cryptography, redundancy across routing layers, and trust models. Finally, it covers key management approaches for MANETs including cluster-based, identity-based, certificate chaining, and multicasting-based methods, as well as the use of intrusion detection systems.