The Kerberos assisted authentication protocol is the efficient protocol that has been used for this identity validation. Kaman is the extension of Kerberos protocols with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. Sat Kaman means Secure, Acknowledge and Timer based KAMAN. This can caused for large number of attacks like replay attack, fabrication, eavesdropping, etc. Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, the KAMAN (Kerberos Assisted authentication in Mobile Ad hoc Network) model has been analyzed for the existing loopholes.