A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. There are many routing protocols used in wireless networks for transmission of message, among which, Location-Aided Routing (LAR) protocol is used to find the location of destination. This may be possible using Global Positioning System (GPS) in mobile. We concentrate on other malicious attacks that would have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the MANET functionality. From this point of view, LAR provides a solution against DoS and DDoS attacks. LAR does not have any security mechanism, so we propose a SE_LAR technique which includes traffic analysis methods and extended OEDA method. It is helpful to analyze the traffic, to detect an overwhelming traffic, legitimate nodes, congestion on network, and snooping attacks. Mobile Ad Hoc Network (MANET) is even more vulnerable to such attacks. So, in this paper, we propose Secure Location-Aided Routing (SE_LAR). Its results are compared with existing secure routing protocols like ISE_DREAM, SE_DREAM protocols. Using the existing SE_DREAM routing protocol malicious nodes are detected by traffic analysis process which is to monitor flooding impact on MANET. The OEDA method discriminates the attacker nodes from reputable nodes by evaluating the addresses in the response signal. But, it cannot be used for dense network, and cannot detect indirect Sybil attack. So, we introduce extended OEDA method with two schemes such as by refering cache memory of neighbor node scheme, and passive Sybil node identity detection, which is incorporated with SE_LAR routing protocol. OEDA method is currently incorporated with the SE_DREAM protocol, generally better known as ISE_DREAM, to produce the route to destination substantially more robust against DDOS attack. Finally we decide using the performance parameters to find out the best alternative among the three different routing protocols. Calculation of the performance of the computation compares SE_DREAM, ISE-DREAM and SE-LAR standards, the overall performance measurements by the NS2 simulator and using the parameters. To determine the effect of network size on the total performance of these protocols, we have three different phenomena.