Research Article Open Access

Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks

S. Varadhaganapathy1, A. M. Natarajan1 and S. N. Sivanandam1
  • 1 ,
Journal of Computer Science
Volume 7 No. 5, 2011, 651-656


Submitted On: 31 December 2010 Published On: 7 May 2011

How to Cite: Varadhaganapathy, S., Natarajan, A. M. & Sivanandam, S. N. (2011). Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks. Journal of Computer Science, 7(5), 651-656.


Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick deployment, would make ad hoc networks convenient for emergency situations other than military applications. In recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality, integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The security associations between nodes were established, when they were in the vicinity of each other, by exchanging appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.

  • 1 Citations



  • Double Hash Authentication Technique (DHT)
  • ad hoc network
  • Dynamic Source Routing (DSR)
  • Source Address (SA)
  • Destination Address (DA)
  • Neighbor Node Address (NA)
  • malicious node
  • routing protocols
  • network topology