The document discusses data intrusion schemes used in mobile ad hoc networks (MANETs). It reviews common problems with data intrusion in MANETs due to their dynamic architecture and limited resources. Several proposed intrusion detection schemes are described, including distributed and cooperative schemes, specification-based schemes, and the proposed Random Walker Detection method. The proposed method aims to efficiently detect intrusions by deploying detection engines at each node and excluding detection engines from random walkers to reduce detection latency. It is described as working on three network layers and using advanced encryption standards to securely detect and route around malicious nodes.