Available online at www.pelagiaresearchlibrary.com Pelagia Research Library Advances in Applied Science Research, 2011, 2 (4):177-186 ISSN: 0976-8610 CODEN (USA): AASRFC 177 Pelagia Research Library Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks G. S. G. N. Anjaneyulu * , V. Madhu Viswanatham ** and B. Venkateswarlu *** *Division of Applied Algebra, SAS, VIT University, Vellore, India **School of Computing Science and Engg, VIT University, Vellore, India ***Dept. of Computer Science, Priya Darshini College of Engg., Nellore, India ______________________________________________________________________________ ABSTRACT Non-infrastructure networks are most commonly called as Mobile Ad hoc networks (MANETs). Unavailability of infrastructure or complexity and expensiveness of setting up the infrastructure results in the need of MANETs. MANETs can also be used when a network is to be setup quickly. The most important and complex problems in this kind of applications are routing, security and key management. The fundamental problem is how to deliver the data packets among nodes confidentially and efficiently without a predetermined topology or centralized control in the unsecured MANET. In this paper, we have given a notion to transmit the data through multipaths between nodes in ad hoc network to enhance the robustness of data confidentiality by secure authentication using digital signature concept. Keywords: Multipath routing, Digital Signature, MANET. ______________________________________________________________________________ INTRODUCTION NETWORKS In any modern network, there is aneed for security. However, the current internet environment without integrating with security mechanisms has a number of security problems and lacks effective protection and integrity of data transferred over the network below the application layer. The networking communication will be exposed to all kinds of attacks in such an open hostile environment. Mobile ad hoc networks are self organizing network architectures in which a collection mobile nodes with a wireless network interfaces may form a temporary without the aid of any established infrastructure or centralized administration. According to the IETF definition, a