In this paper [
1] researchers used hashing functions for secure encryption. In this research [
2] the researcher proposed EAACK and it includes ACK, SACK and MAR schemes. It is concluded that collusion is not found in the network when hash functions are used [
3]. SHA (Secure Hash Algorithm) shows that slide attacks occur on Hash function. In research [
4], researchers proposed EAACK technique which is the combination of SHA and DSA and it is also vulnerable to slide attacks. In [
5], an evaluation of Boolean function is used to prove that differential attack can occur if SHA-3 is used. In [
6], the researchers proposed a methodology by using Chinese remainder theorem (CRT) based key generation that suffer from birthday attack and computation cost is also very high using CRT technique.. In [
7], authors showed that the birthday attacks have easily occurred on CRT technique when the private and public key is very small. It has also shown that CRT can be broken down easily. In [
8], the researchers proposed a technique by using CRT). Researcher briefly describes in [
9] that Chinese remainder theorem based techniques suffer from vulnerabilities of computationally hiding commitments. In this research [
10] researcher proposed a lightweight Elliptic curve based cryptography scheme for the security of nodes in MANET. ECC is an efficient technique for security issue. it is noticed that collision search attack possible to occur on the proposed procedure and study has verified to reduce the time of breaking ECC in [
11]. In this research [
12] researcher proposed Distributed Public key Infrastructure using Shamir Secret Sharing methodology which permits the nodes to share their private key among other nodes in MANET. Communication is done by using the Tiny Encryption Algorithm (TEA). The TEA can be infected by key equivalence attack [
12]. This attack is done by using a known plain/cipher text pair of any unknown key (K). In the proposed methodology researchers also used the Diffie Hellman Key exchange algorithm which is less secured, because it has low-security performance that is verified/proven by the researchers in [
13]. In paper [
14], the researchers proposed a new technique, recognized as QOS secure encryption (QASEC), to reach better throughput by securing end-to-end communication in MANETs. In paper [
15] researchers focused on secure intrusion detection system using RSA to provide security to physical devices in mobile ad hoc networks against attackers. However, RSA has some drawbacks[
16]. RSA algorithm is attackable by some sort of mathematical attacks, small private key attacks, small public key attacks, implementation attacks, and elementary attack. In [
17], researchers concentrate on some malicious activities in Manet. They proposed an Adaptive Approach Detection using KDS with a shuffling algorithm. This scheme minimizes the effect of key management-based authority certificates and minimizes acceptance level without disturbing the nodes. In this paper researchers proposed Cooperative Bait Detection Scheme (CBDS), which has some drawbacks. the drawbacks of CBSD technique were increased computational overhead and reduced efficiency [
18]. In [
19], researchers proposed a technique named as TRIM in which three nodes are referee nodes. Proposed methodology used hashing function. However, it is concluded that it is difficult to find collusion and slide attacks in the network while using hash function [
3]. In [
20], researchers proposed a new cryptography scheme that is Letter to Shape Encryption for providing security among nodes in the Manet. This method exchanges different shapes for letters in a message that will be transmitted. This scheme is harmless in contradiction of man in the middle attack. Researcher proved in [
21], that this technique has too much simpler algorithm, the attacker can easily break the security. Data security in WSN is very difficult due to sensor nodes limited lifetime. An efficient approach for data security in WSN is given in [
22]. This research approach gives a decent amount of data security, yet it does not reduce sensor node lifetime. [
23] used an efficient genetic based security algorithm with ElGamal key generation method to secure data in WBAN. The Robust Cluster Based Routing Protocol (RCBRP) is described in this study [
24] in order to pinpoint the routing paths that use the least amount of energy and so extend the life of the network. For the purpose of examining ow and communication, the design is provided in six phases. We suggest the following two algorithms: (i) an energy-efficient clustering and routing method (and (ii) a distance and energy consumption calculation technique. Clustering the smart devices allows the system to use less energy while balancing the load. With a focus on data security challenges across many clouds, this paper [
25] suggests the Proficient Security over Distributed Storage (PSDS) technique. The data is separated into two categories by PSDS: normal and sensitive, with the latter category being further broken into two portions. While the typical data is uploaded on a single cloud in encrypted form, each component is encrypted and dispersed over multiple clouds. Sensitive data is combined from many clouds during the decryption stage. The PSDS has been put to the test against a number of attacks, and it has been determined that it is resistant to related key attacks, pollution attacks, chosen ciphertext attacks, and well-known plain text assaults. Building upon the foundational work laid out in [
24,
25,
26,
27,
28,
29,
30], our proposed Collusion Attack Prevention (CAP) scheme for securing Mobile Adhoc Networks represents a significant advancement in the field. The techniques and methodologies introduced in [
31,
32,
33,
34] provide a solid basis for understanding the challenges in ad hoc networks, while the innovative approaches outlined in [
35,
36,
37,
38,
39,
40,
41,
42,
43,
44,
45,
46,
47,
48,
49,
50,
51,
52,
53,
54,
55,
56,
57,
58,
59] inform and inspire our design choices for effective collusion attack prevention.