Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: A wireless sensor network is usually composed of a large number of spatially distributed autonomous sensor nodes. Advancement in the field of modern communication networks especially in the wireless network dramatically improved their accessibility,affordability and accuracy. The eavesdropping is a serious security threat to a WSN since this attack is a prerequisite to other attacks. Avoiding the major threat called eavesdropping,cryptographic techniquies are to be used. Reexamine the notion of security,accessibilty,affordability and confidentiality of the WSN, combines Shannon's cypher method and Ford-Fulkerson algorithm together with one time pad system. The idea behind the algorithm is simple. According to Ford-Fulkerson algorithm,as long as there is a path from start node to end node with available capacity on all edges in the path, send flow along one of these paths,find another path and so on.That path is called augmented path. Through this non-cooperative eavesdropping can be avoided. Ford-Fulkerson algorithm can be used along with the one time pad scheme. The one time pad scheme is a binary additive stream cipher, where stream of truly random keys are generated and then combined with the plaintext for encryption or with the ciphertext for decryption using exclusive OR addition. Because of the three important properties of this scheme one time pad scheme can accepted as the most prominent security providing mechanism,properties such as: key must be as long as the plain text, key must be truly random and key must only be used once. Main disadvantage is that one time pad scheme has a serious threat to Brute force attack. Thus for avoiding the brute force attack combines Ford-Fulkerson and ZKP along with the AES algorithm.

Authors and Affiliations

Sreelekshmi Murali

Keywords

Related Articles

Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment

Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will b...

Energy Secure Dynamic Source Routing (ESDSR) Protocol For (MANET)

Abstract : MANET (Mobile Ad-hoc Network) is an unstructured, self-organized and self-deployment network. It can be set up anywhere, anytime because there is no need of centralize base station. Nodes in MANET are connecte...

 Chip Implementation of Text Encryption and Decryption Algorithms

 Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except t...

 Energy Efficiency in IEEE 802.11 standard WLAN through  MWTPP

 The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in PCF for enhancing...

 Fast Remote data access for control of TCP/IP network using android Mobile device

 Abstract: In today’s world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as...

Download PDF file
  • EP ID EP137181
  • DOI 10.9790/0661-16585055
  • Views 104
  • Downloads 0

How To Cite

Sreelekshmi Murali (2014).  Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 50-55. https://europub.co.uk/articles/-A-137181