2015 Intenational Conference on Industrial Instrumentation and Control (ICIC)
Co/ege ofEngineering Pune, Indi. May 28-30,2015
Design of an Eficient Initial Access
Authentication over MANET
Y ogesh P. Singare
Department Of Computer Science and Engineering
G.H. Raisoni College of Engineering, Nagpur, India
yogesh.shingare 14@gmail.com
Abstract: Nowadays, the importance of Mobile Ad hoc Networks
(MANETs) is growing rapidly especially in military and business
applications. It is crucial to have a more eicient initial link setup
mechanism. In this work, we propose an eicient initial access
authentication protocol, which realizes the authentications and
key distribution through least roundtrip messages. We propose
eicient initial access authentication mechanism over MANET
that is more eicient than any message authentication method in
the literature. The key idea behind the proposed method is to
provide eicient initial authentication as well as to provide secure
message passing between Mobile user and authentication server.
Furthermore, a simple and practical method is presented to make
compatible with MANET.
Indx Terms-Authentication, MANET, Securiy
I. INTRODUCTION
Mobile Ad hoc Networks (MANETs) [25] are
networks composed of a set of communicating devices able to
spontaneously interconnect without any pre-existing
inrastructure. Devices in range can communicate in a point
to-point fashion. In addition to that, these devices are
generally wide spread of lightweight and low-cost mobile
devices such as mobile phones, PDAs, Pocket pes, etc which
now embed Bluetooth and WiFi (IEEE 802.11) network
adapters enable the spontaneous creation of city-wide
MANETs. The topology of MANET changes requently due
to the Mobility of MANET. Still, advantage of MANET such
as not requires pre-existing inrastructure. More and more
people are interested in ad hoc networks. Not only their
importance in military applications is growing, but also their
impact on business is increasing. These networks could then
constitute the inrastructure of numerous applications such as
emergency and health-care systems groupware gaming
advertisements, customer to-customer applications like the
UbiBay project etc.
In a MANET, every time the mobile device enters an
extended service set (ESS), it has to do an initial set-up to
establish MANET connectivity which generally includes the
discovery and association of an AP, along with 802.11i
978-1-4799-7165-7/15/$31.00 ©2015 IEEE 1614
Asst.Prof. Manish Tembhurkar
Department Of Computer Science and Engineering
G.H. Raisoni College of Engineering, Nagpur, India
manish.tembhurkar@gmail.com
authentication and acquisition of an IP address. This works
well when the number of new stations (U) in a given time
period is small. However, when a large number of users
simultaneously enter an ESS, an eficient mechanism that
scales well is required to minimize the time STAs spend in the
initial link setup, while maintaining a secure authentication.
While the setup of the initial connectivity consumes a lot of
time, consequently, mobile devices cannot make fullest use [6]
of the MANET and a lot of services are diicult to carry out.
The security and more eficient initial link setup have become
one of the primary concerns as MANETS are being used
widely.
The Section II introduces pervious related work and
analysis to the scheme. Section III describes the new secure
authentication scheme in detail. Section IV describes
discussion on proposed scheme. Section V show result &
graphical analysis and conclusions done in section VI.
II. RELEATED WOK AND ANALYSIS
In networking world, different numbers of
authentication methods are designed to conirm the truth of an
attribute of a single piece of data or entity.
IEEE 802.11 [22], the most widely used standard, to
perfonn the operations over WLANs. The original design in
the standard provides only some basic authentication
mechanisms, such as preshared key establishment and
password veriication implemented between a user and server,
called Wired Equivalent Privacy (WEP). WEP is not secure
because an attacker can obtain unauthorized access through
intercepted messages. The security of IEEE 802.11 was latter
amended to include Wi-Fi Protected Access (WPA) and
WPA2 [24].But the main reason leading to its ineficiency is
that 802.11i is designed rom the ramework perspective
which introduces too many extra messages as shown in ig.I.
Rather than being a speciic protocol, 802.1Ii is designed as a
unifonn ramework where different authentication protocols
[1] can be incorporated as shown in Table I with different
satisied properties.