Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: A wireless sensor network is usually composed of a large number of spatially distributed autonomous sensor nodes. Advancement in the field of modern communication networks especially in the wireless network dramatically improved their accessibility,affordability and accuracy. The eavesdropping is a serious security threat to a WSN since this attack is a prerequisite to other attacks. Avoiding the major threat called eavesdropping,cryptographic techniquies are to be used. Reexamine the notion of security,accessibilty,affordability and confidentiality of the WSN, combines Shannon's cypher method and Ford-Fulkerson algorithm together with one time pad system. The idea behind the algorithm is simple. According to Ford-Fulkerson algorithm,as long as there is a path from start node to end node with available capacity on all edges in the path, send flow along one of these paths,find another path and so on.That path is called augmented path. Through this non-cooperative eavesdropping can be avoided. Ford-Fulkerson algorithm can be used along with the one time pad scheme. The one time pad scheme is a binary additive stream cipher, where stream of truly random keys are generated and then combined with the plaintext for encryption or with the ciphertext for decryption using exclusive OR addition. Because of the three important properties of this scheme one time pad scheme can accepted as the most prominent security providing mechanism,properties such as: key must be as long as the plain text, key must be truly random and key must only be used once. Main disadvantage is that one time pad scheme has a serious threat to Brute force attack. Thus for avoiding the brute force attack combines Ford-Fulkerson and ZKP along with the AES algorithm.

Authors and Affiliations

Sreelekshmi Murali

Keywords

Related Articles

 Review paper on performance analysis of AODV, DSDV, OLSR  on the basis of packet delivery

 The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...

 A novel semantic level text classification by combining NLP and Thesaurus concepts

 Abstract: Text categorization (also known as text classification or topic spotting) is the task of automatically sorting a set of documents into categories from a predefined set. Automated text classification is at...

Design of Mobile Robot Navigation system using SLAM and Adaptive Tracking Controller with Particle Swarm Optimization for Indoor Environment Monitoring

[i][/i]Abstract: Now a day mobile robot work as a autonomous machine which is used to control the locomotion and move around in environment by varying the physical location A self localization & mapping of mobile rob...

 Improving Web Image Search Re-ranking

 Nowadays, web-scale image search engines (e.g. Google Image Search, Microsoft Live Image Search) rely almost purely on surrounding text features. This leads to the ambiguous and noisy results. We propose an...

Mining Interesting Medical Knowledge from Big Data

Abstract: There are many real life applications where uncertain big data is generated. For example: medical data, stock exchange, social media and many more. Big data works on the data which is unstructured. Miningsuch a...

Download PDF file
  • EP ID EP137181
  • DOI 10.9790/0661-16585055
  • Views 96
  • Downloads 0

How To Cite

Sreelekshmi Murali (2014).  Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 50-55. https://europub.co.uk/articles/-A-137181