Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology
network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick
deployment, would make ad hoc networks convenient for emergency situations other than military applications. In
recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number
of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them
consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality,
integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into
consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The
security associations between nodes were established, when they were in the vicinity of each other, by exchanging
appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing
(DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for
ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash
Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash
Technique in association with SHORT has improved the performance of the DSR protocol