%0 Journal Article %T Hash Security for Ad hoc Routing %A Ashwani Kush %A C. Hwang %J BVICAM's International Journal of Information Technology %D 2011 %I Bharati Vidyapeeth's Institute of Computer Applications and Management %X A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. An attempt has been made to review some of the existing protocols. Finally a new scheme based on Hashing has been proposed to secure an existing protocol. One-way hash chain is used to protect hop-by-hop transmission. The scheme has been incorporated using AODV as base protocol and results have been explained using NS. %K Security %K Ad hoc networks %K Routing protocols %K Key Management %K AODV. %U Security, Ad hoc networks, Routing protocols, Key Management, AODV.