Security Vulnerabilities in Ad hoc Networks