In this textbook, three works has been proposed to overcome the challenges in the ad hoc wireless network. The wireless networks face many different challenges comparing to the traditional wired networks. The dynamic and unplanned nature of these wireless ad-hoc networks lead to some challenges. The challenges include less recourse availability in terms of bandwidth, processing capacity, large scale topology of the network, security loss in packet transmission, break in node transmission by wrong link established by intruder nodes, etc., new algorithms and techniques are proposed in this research work to overcome these challenges. In the first work, IPTR methodology has been implemented. Thus, in the proposed IPRT technique, protection-based communication is performed by detecting the fake nodes present in the network, and sending a warning message for the fake nodes. In the work 2, Extended Congruity Path Optimization (ECPO) has been implemented to obtain the optimized routing path. Thus, with the proposed ECPO technique, optimized routing path is obtained by checking the node steadiness, and transmitting the data packets only through the high steadiness nodes and the low steadiness nodes are rejected from the network. Rehearse node algorithm is used to check the steadiness of the nodes. Thus, the network lifetime and the power utilization of the network is found to be better in the ECPO technique. Also Rehearse node connection scheme is designed and implemented which monitors the node characteristics. In the work 3, decentralized scalable security framework has been implemented for protection provision in the WSN-IONT communication. Thus, the proposed DSSF techniques support decentralization and security-based communication is performed. Hence device and network level security are achieved through CA and block chain technique.