Future wireless communication systems will be greatly dependent on the instantaneous deployment of independent mobile users. Some of the notable and interesting examples include creating sustainable, well organized, well planned, effective, and active communication systems for emergency/exigency/crises operations, catastrophe relief efforts, and military networks. Such networking situations depend on distributed, dispersed and disorganized connectivity, and can be designed as applications of Mobile Ad Hoc networks. A MANET is a self-governing and self-organizing collection of mobile nodes with relatively equal bandwidth that communicate over restricted wireless links. A MANET network is decentralized and disseminated, where all networking including topology discovery and conveying the messages must be achieved by the nodes themselves, i.e., routing capabilities are assimilated into mobile nodes. However, determining feasible routing paths for distributing messages in a decentralized network where network topology varies is a difficult job. Factors such as the open medium and vast distribution of nodes, topological changes, variable wireless link quality, and propagation path loss become pertinent issues and make MANET unprotected to intrusions. Thus, it becomes pivotal to develop a systematic intrusion detection scheme to secure Mobile Ad Hoc networks from intruders. In this paper, we put forward and applied an efficient IDS mechanism based on Enhanced Adaptive Acknowledgment (EAACK) especially made for MANETs which performs better than the previous techniques such as Watchdog, TWOACK and AACK. Keywords: Mobile Ad hoc Network (MANET) Acknowledgment (ACK), Secure Acknowledgment (S-ACK), Misbehavior Report Authentication (MRA), Digital Signature Algorithm (RSA), Enhanced Adaptive Acknowledgment (EAACK). 1. Introduction WIRELESS networking is the need of hour for many applications because of its easier network expansion, increased mobility [27] [29], improved responsiveness, better access to information, and enhanced guest access. In addition, with the increasing standard of industry and use of lightweight network hardware devices that are even smaller and largely mobile. The wireless communication is enhanced by Mobile ad hoc networks (MANETs) having high degree of node mobility. A Mobile Ad Hoc Network (MANET) [28] is a self-maintaining and self-configuring network with autonomous nodes, collection of mobile nodes formed without the use of centralized infrastructure. The communication between the nodes is done with wireless transmitter and wireless receiver within the specified communication range. This means that the two nodes can communicate only if they are present in specified range. MANET [28] solves this issue by allowing the intermediate nodes to transmit data transmissions. This is attained by dividing Mobile Adhoc Networks into two types of networks, viz, single-hop and multi-hop. In a single-hop, all mobile nodes which lie in the same radio communication range transfer data directly among each other [9]. On the other side, in a multi-hop network, nodes depend on other intermediate nodes to transmit data, if destination node is beyond their radio communication range. MANETs are growing rapidly. Manets are used in various fields due to their large applications like in Military, Industrial use, civilian use. Manets can be set up without using static infrastructure or human interaction. The network topology changes frequently [29] as the mobile nodes have an important property i.e. the mobility that gives them the flexibility to move anywhere in the network or can move outside the network. This flexibility provided is useful but on the other hand makes it vulnerable to new security risks due to the cooperativeness and open broadcast medium of the mobile devices (that generally possess computational capacities and different resource, and limited battery power). As a result, intrusion detection becomes an indispensable part of security for MANETs. The intrusion detection techniques designed for traditional wired networks cannot be implemented for wireless networks due to different characteristics. Therefore, to make intrusion detection systems work effectively new techniques need to be developed for MANETs. This paper is divided into different sections as follows. Section 2 gives brief idea on the background of intrusion Mumtaz Ahmed et al.