This document proposes securing mobile ad hoc networks through mobility-based clustering and threshold cryptography. It involves three stages: discovery, merging, and maintaining. Threshold cryptography distributes secret data among nodes such that any p or more nodes can access the data, but fewer than p nodes cannot. The algorithm involves nodes calculating stability values, clustering, merging clusters, and maintaining the topology as nodes join or leave. Threshold cryptography combined with clustering could provide a secure key management service for mobile ad hoc networks.