This document summarizes various techniques that have been proposed for secure data transmission in mobile ad hoc networks in the face of security attacks. It discusses works that use techniques like self-protocol trustiness and the Dempster-Shafer theory to detect blackhole attacks. A dynamic forwarding window technique is described for detecting denial of service attacks in wireless sensor networks. The document also reviews improved CONFIDANT and other techniques for detecting grayhole, sinkhole, and jellyfish attacks on AODV routing. Cryptographic techniques including elliptic curve cryptography have also been proposed and evaluated for secure transmission and misbehavior detection in MANETs.