2015 Intenational Conference on Industrial Instrumentation and Control (ICIC) Co/ege ofEngineering Pune, Indi. May 28-30,2015 Design of an Eficient Initial Access Authentication over MANET Y ogesh P. Singare Department Of Computer Science and Engineering G.H. Raisoni College of Engineering, Nagpur, India yogesh.shingare 14@gmail.com Abstract: Nowadays, the importance of Mobile Ad hoc Networks (MANETs) is growing rapidly especially in military and business applications. It is crucial to have a more eicient initial link setup mechanism. In this work, we propose an eicient initial access authentication protocol, which realizes the authentications and key distribution through least roundtrip messages. We propose eicient initial access authentication mechanism over MANET that is more eicient than any message authentication method in the literature. The key idea behind the proposed method is to provide eicient initial authentication as well as to provide secure message passing between Mobile user and authentication server. Furthermore, a simple and practical method is presented to make compatible with MANET. Indx Terms-Authentication, MANET, Securiy I. INTRODUCTION Mobile Ad hoc Networks (MANETs) [25] are networks composed of a set of communicating devices able to spontaneously interconnect without any pre-existing inrastructure. Devices in range can communicate in a point to-point fashion. In addition to that, these devices are generally wide spread of lightweight and low-cost mobile devices such as mobile phones, PDAs, Pocket pes, etc which now embed Bluetooth and WiFi (IEEE 802.11) network adapters enable the spontaneous creation of city-wide MANETs. The topology of MANET changes requently due to the Mobility of MANET. Still, advantage of MANET such as not requires pre-existing inrastructure. More and more people are interested in ad hoc networks. Not only their importance in military applications is growing, but also their impact on business is increasing. These networks could then constitute the inrastructure of numerous applications such as emergency and health-care systems groupware gaming advertisements, customer to-customer applications like the UbiBay project etc. In a MANET, every time the mobile device enters an extended service set (ESS), it has to do an initial set-up to establish MANET connectivity which generally includes the discovery and association of an AP, along with 802.11i 978-1-4799-7165-7/15/$31.00 ©2015 IEEE 1614 Asst.Prof. Manish Tembhurkar Department Of Computer Science and Engineering G.H. Raisoni College of Engineering, Nagpur, India manish.tembhurkar@gmail.com authentication and acquisition of an IP address. This works well when the number of new stations (U) in a given time period is small. However, when a large number of users simultaneously enter an ESS, an eficient mechanism that scales well is required to minimize the time STAs spend in the initial link setup, while maintaining a secure authentication. While the setup of the initial connectivity consumes a lot of time, consequently, mobile devices cannot make fullest use [6] of the MANET and a lot of services are diicult to carry out. The security and more eficient initial link setup have become one of the primary concerns as MANETS are being used widely. The Section II introduces pervious related work and analysis to the scheme. Section III describes the new secure authentication scheme in detail. Section IV describes discussion on proposed scheme. Section V show result & graphical analysis and conclusions done in section VI. II. RELEATED WOK AND ANALYSIS In networking world, different numbers of authentication methods are designed to conirm the truth of an attribute of a single piece of data or entity. IEEE 802.11 [22], the most widely used standard, to perfonn the operations over WLANs. The original design in the standard provides only some basic authentication mechanisms, such as preshared key establishment and password veriication implemented between a user and server, called Wired Equivalent Privacy (WEP). WEP is not secure because an attacker can obtain unauthorized access through intercepted messages. The security of IEEE 802.11 was latter amended to include Wi-Fi Protected Access (WPA) and WPA2 [24].But the main reason leading to its ineficiency is that 802.11i is designed rom the ramework perspective which introduces too many extra messages as shown in ig.I. Rather than being a speciic protocol, 802.1Ii is designed as a unifonn ramework where different authentication protocols [1] can be incorporated as shown in Table I with different satisied properties.