ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 12, December 2014 Copyright to IJARCCE DOI 10.17148/IJARCCE.2014.31247 8885 An efficient protocol for secure communication in Wireless Ad Hoc Networks S.MothiVenkata Manoj 1 , Dr. S. Vasundra 2 Department of Computer Science & Engineering, JNTUA, Anantapuramu , Andhra Pradesh, India 1 Professor, CSE Department, JNTUA, Anantapuramu, Andhra Pradesh, India 2 Abstract: A spontaneous Ad Hoc networks are formed by a group of mobile terminals placed in a closed location used for communication and sharing resources and services, An authenticated protocol is a self- configured secure protocol that is used to create the network and share the services without any infrastructure. This protocol include all functions need to operate without any external support. This authentication protocol runs on the basis of the symmetric or asymmetric scheme and the trust between the users. This trust will create based on direct contact between the users. proposed protocol is an automated one which can create the network itself and share the services through that network securely without any infrastructure. This authenticated network not only allows sharing the services but also starting new services among the existing users in network in secured way. To create impulsive wireless Ad Hoc networks which is used to exchange the initial data and the secret keys? This protocol is also used for intruder detection that is detecting malicious nodes in the network. This Ad Hoc network increases the performance of the system and provides the security in the wireless Ad Hoc networks. Keywords: Authenticated protocol, Impulsive network, Ad Hoc, Security, Intrusion detection 1. INTRODUCTION A wirelessAd Hoc Network is a connection of wireless mobile nodes used for transferring data between without any pre-existing infrastructure. Ad Hoc networks are not depending on any other third party for communication. Laptop, computers and personal digital assistants(PDA’S) that communicate directly with each other these are some examples of mobilenodes/terminal in Ad Hoc network. In the Ad Hoc network nodes are of mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodesare usually for deploy relay points in which might be needed temporarily. Wireless networking is an emerging technology that allows users to access services and information electronically, regardless of their geographic position [2]. Figure 1: Wireless Ad Hoc Network There are five key challenges in wireless Ad Hoc networks. They are: 1. Network boundaries must be poorly defined 2. The network is not planned before 3. Hosts are not pre-configured earlier 4. There are no central servers in the network 5. Users may not be experts There are some characteristics for impulsive networks: 1. Wireless communication 2. Mobility 3. Do not need infrastructure 4. but can use it, if available 5. small, light equipment Intrusion detection system (IDS) [3] plays an important role in detecting different types of attacks. In general, the main function of intrusion detection system is to protect the network, analyze and find out intrusions among audit and normal audit data, and this can be considered as a classification problem. Intrusion detection system can be mainly classified into two methods i.e. misuse detection and anomaly detection n methods based on detection method. The misuse detection method runs on database of well-known attack signatures; the system stores patterns (or signatures) of known attacks and uses them to compare with the actual actions. Anomaly-based intrusion detection is another process to intrusion detection. Anomaly detection works on the principle that “attack behavior” is somewhat different from “normal user behavior”. Thereare some Anomaly detection algorithms that have the advantage over a signature-based detection that they can also detect novel attacks. In spite of this, Anomaly detections methods are able to detect new types of intrusions, most of these anomaly-based IDSs affected from a high rate of false alarms due to a shortage in their discrimination ability. 2. RELATED WORK A wirelessAd Hoc Network is a connection of wireless mobile nodes used for transferring data between without any pre-existing infrastructure. Ad Hoc networks are not depending on any other third party for communication. It is important because of their independence of pre-existing