In this paper, we elaborated on preventive mechanisms either based on cryptographic solutions or trust based infrastructure Moreover, both the localized and ACK-based detection techniques were discussed. Global and local end node reaction mechanisms against ongoing intrusions and threads in order to avoid persistent adverse effects were further discussed. Finally, this paper highlighted open challenges which need to be addressed to secure Ad Hoc networks of the future.