International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-8, Issue-2S2, January 2019 43 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: B10100182S219/19©BEIESP Abstract - (MANETs) are being very trendy these days and used in a number of applications where security is challange like military operations or other sensitive projects, whereby if the network is compromised then the outcomes can be terrible. It would not be easy task to apply energy efficient and reliable routing in MANETs, because it will not be possible to recharge / replace a battery of mobile node. To take full benefit of the lifetime of nodes, traffic should be routed in a way that energy usage also should be minimized. A lot of security proposal have came which address different protocol stack but no scheme is fully integrated with respect of energy and security. The proposed integrated approach based on Identity cryptography which belongs to the class of pair wise cryptography, addresses all the concerns like secure routing and key management as well as energy.It is a general method for providing routing security and can be applied to any routing protocols. Keywords: Cryptography, MANET, communication, routing 1. INTRODUCTION Security during routing becomes very important in sensitive application .Designing of a routing protocol that can ensure the security and efficient quality of service in general is a great challenge .Various proposals for securing the process of routing in MANETs came into account but none of them includes the dependency cycle. Although cryptographic techniques have been widely used in routing to shield routing information from adversary, such an approach may not be practical for real MANETs due to deep computational overhead and lack of capability of spotting attacking nodes given the high mobility of MANETs where nodes can join or leave the networks [1].Energy management is a genuine issue at communication time and idle time in most of the applications of MANETs such as WSN,UAANETand IoT etc.In the proposed ID based scheme the sender can use the receiver’s identity of public key to encrypt message, and the receiver can decrypt the cipher text by his own private key obtained from the public key generation according to his identity.The paper also consider the energy efficiency factor by reducing the power consumed in communication as well as in computation. The whole paper is arranged as: Section 2 presents related work in key management for secure routing in MANETs.Section 3 explains the motivation behind the work,Section 4 describes the proposed identity based security Revised Manuscript Received on December 22, 2018. Renu, Rajiv Gandhi Technological University, Bhopal, India (e-mail: renutrivedi@rediffmail.com) Sanjeev Sharma, Rajiv Gandhi Technological University, Bhopal, India method including various phases and Section 5 is kept for Performance evaluation with basic security services.Last section concludes the work with future aspects in this area. 2. LITERATURE SURVEY various mechanisms and protocols have been proposed for preserving energy and securing MANETs, but no solutions can directly be applied for this environment. In general, a routing protocol which does not require large tables to be downloaded or greater number of calculations is preferable, the amount of data compression before transmission decreases the power consumed for communication although the number of computation tasks increases.Power-aware Multiple Access Protocol PAMAS [4] uses model to make the use of nodes running low on battery power by making the nodes off when they are not in use. Other power-aware routing protocol [5] Online Max-Min (OMM) by Li et al given by maximizing the minimal residual power, to reduce the rate of overloaded nodes. . Basic cryptographyworks with Public Key Infrastructure (PKI)and suffers with the security of a central control Authority (CA) for issuing digital certificates .PKI also have overhead storage of public key certificates. In 1984, Shamir [9] suggested the solution as identity-based cryptography to avoid these situation .Boneh etc proposed the first model of ID based security scheme based on bilinear maps on an elliptic curve.Previous proposed methods are not suitable for mobile networks lacking with centralized key management agent because they assumed that all nodes in the network are helpful and truthful during the routing process. Constrained devices with battery power, storage capacity and processing capacity are not compatible withtraditional cryptographic algorithms those are executed with high processing, storage and power consumption. 3. MOTIVATION As we found from previous papers,all routing messages have two type of fields one is static and can not be changed ,another is modifiable by intermediate nodes. No one has differentiate these static fields and changeable fields . The receiver not be able to detect misbehavior because no history is available . Digital signature can work as authentication mechanism to ensure that the changeable fields are not illegally modified. Digital signatures from all to the intermediate node are appended and verified by the next hope Renu, Sanjeev Sharma An Energy Efficient Integrated Framework For Secure Routing And Key Management In Mobile Ad-Hoc Networks