ttp://iaeme.com/Home/journal/IJCET 152 editor@iaeme.com h International Journal of Computer Engineering & Technology (IJCET) Volume 9, Issue 5, September-October 2018, pp. 152 160, Article ID: IJCET_09_05_018 Available online at ttp://iaeme.com/Home/issue/IJCET?Volume=9&Issue=5 h Journal Impact Factor (2016 9.3590(Calculated by GISI) www.jifactor.com ): ISSN Print: 0976-6367 and ISSN Online: 0976 6375 © IAEME Publication DESIGN OF SECURE ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Suresh Kanchi Ph.D Student, Department of Computer Science and Engineering, School of Engineering , SSSUTMS, Sehore. Lalbahadur Kethavath Assistant Professor, Department of Computer Science and Engineering Teegala Krishna Reddy Engineering College, Hyderabad Dr. R. P. Singh School of Engineering, SSSUTMS, Sehore ABSTRACT The characteristics of Mobile Ad hoc Network (MANET) allows to call it as self- governing system of nodes in mobility and such mobile nodes are connected by wireless links. The MANET comes under class of wireless networks, particularly under infrastructure-less category. In MANET, the node acts as a termination system, also as an intermediate node and packet being forwarded by such node popularly called as router. The MANET nodes are in mobility therefore they change their locations. The node are enough capable to organize within them in turn changes happen dynamically for the current topology in which the node are. The major concern with respect to MANET nodes is, forming an optimum level and ideally an efficient route between any two parties wish to participate in exchange packets. It is the principal worry of the protocols related to the routing mechanism in MANET. Key words: authentication, security, encryption, proactive, reactive, on-demand, MANET, attacks, AODV, DSR. Cite this Article: Suresh Kanchi, Lalbahadur Kethavath and Dr. R.P. Singh, Design of Secure Routing Protocols for Mobile Ad hoc Networks. International Journal of Computer Engineering and Technology, 9(5), 2018, pp. 152 160. - ttp://iaeme.com/Home/issue/IJCET?Volume=9&Issue=5 h 1. INTRODUCTION We are in the era of the information storage and retrieval in the context of exchanging messages among the node in the network. The information may intended for a single node or multiple node or broadcasting. In this context, the information is distributed across the nodes in distributed environment. The information needs to be provided a security from attacks. It is to ensure authentication, confidentiality, integrity and availability. The attacks may be in different layers and are identified and studied in research. An intruder or attacker observe