IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, PP 01-11 www.iosrjournals.org National Conference on Advances in Engineering, Technology & Management 1 | Page (AETM’15)” Secured Authentication Method for Wireless Networks Umesh Kumar 1 , Sapna Gambhir 2 1, 2 (Computer Engineering Department, YMCA University of Science and Technology, Faridabad, India) ABSTRACT: There are huge number of validation systems for system access focused around declaration, biometric, smart card with pin, password and so forth. One of the new and more prevalent validation procedures is OTP. The principle focal point of that is it is more secure as every time new secret key is utilized so recalling the password is no more needed. Each time new OTP is produced so no password is used over and over. If OTP generator is good then it makes this technique more secure. This paper describes EAP protocol and proposed EAP method for authentication. Keywords EAP, MD5, OTP, PEAP, SHA I. INTRODUCTION As more administrations are getting to be online like net banking, online form filling and so on some of these services require authentication. Authentication is critical period of any correspondence. In the event that authentication technique is weak then 50% of fight is win by hacker however in the event that authentication strategy is solid then risk of getting hacked is less. Authentication [1] is the system to confirm the legitimacy of a client whether he/she is a legitimate client or not. When there is a talk regarding networking then clients need to fulfill some condition like having a valid user name and secret key of that server. In the event that user is valid then server permits him to get to the server's assets. So it is vital for a system to utilize such a robust strategy for verification so that no other than a valid client can get to the system rather not an individual who is not a legitimate client however utilizing hacking or whatever viable illicit path attempt to get to the system. When somebody tries to log on a workstation, they are generally initially asked for to identify themselves with a login name and password. Subsequently, this combination is checked against a current login-secret key legitimacy record to check if the mix is true. Provided that this is true, the client is verified. At last, a set of predefined consents and confinements for that specific login name is relegated to this client, which finishes the last step, approval. If information is not important then it might be accessed by anybody however in the event that it is classified then it rely on how the verification routines protects from unapproved access. So it ought to be strong to the point that it can't without much of a stretch be hacked and shouldn't be costlier than the data we are securing. Authentication can hold highly complex and secure strategy or be exceptionally straightforward. Straightforward type of verification is the transmission of share password between elements wishing to authenticate each other. II. NEED OF AUTHENTICATION Authentication is the methodology which permits the sender and recipient to approve one another. On the off chance that the sender and recipient of data can't appropriately validate one another, there is no trust in exercises or data given by other party. Let ’s understand this by the assistance of a sample: in a banking system, when somebody deposits cash in somebody banks account no confirmation is obliged in light of the fact that there is nobody who would store cash in other's record without any reason or it could be conceivable that by error he/she compose the wrong record number. In any case when the cash is withdrawn, then it requires validation and in verification it requires mark and pin number if cash is withdrawn by ATM [2]. So that nobody other than the authentic user can make any transaction without the consent. So validation is vital thing and it relies on upon the kind of data to be used. III. METHODS OF AUTHENTICATION There are different types of methods currently available for authentication. Currently there are many authentication methods available [1] .Some of the basic types are: Using Card & Pin In this type of strategy a pin is given and card needs to be swiped and after that the pin is to be entered. Pin is only a mix of a few digits when considered the instance of ATM then the pin is four digit numeric qualities. Signature Verification [1]