TY - JOUR AU - Varadhaganapathy, S. AU - Natarajan, A. M. AU - Sivanandam, S. N. PY - 2011 TI - Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks JF - Journal of Computer Science VL - 7 IS - 5 DO - 10.3844/jcssp.2011.651.656 UR - https://thescipub.com/abstract/jcssp.2011.651.656 AB - Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick deployment, would make ad hoc networks convenient for emergency situations other than military applications. In recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality, integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The security associations between nodes were established, when they were in the vicinity of each other, by exchanging appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.