Mobile and wireless network technology is growing at a rapidly changing in nowadays. Ad hoc networks are a new wireless networking paradigm for mobile host. Ad hoc networks do not rely on any fixed infrastructure such as base stations as mobile switching. Mobile hosts rely on each other to keep the network connected. Ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions. In this paper, we detail security threat against ad hoc routing protocols, specifically examining CBRP. Our authentication protocol based on CBRP(APBC) design an end-to-end message authentication scheme that relies on mutual trust between nodes in other clusters. The strategy of APBC is to take advantage of the multi-layer architecture that is designed for authentication protocol in CHs(Cluster Head) using MCH(Main CH). We have proposed an authentication protocol that uses certificates contain Diffie-Hellman key agreement and a multi-layer architecture at the physical layer so that the number of encryption needed, thereby reducing the computational overheads and successfully defeated all identified attacks. We also use new authentication protocol schemes, such as MCH using Challenge-Response identification protocol to build a highly secure and highly available authentication protocol service, which forms the core of our security framework.