Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: A wireless sensor network is usually composed of a large number of spatially distributed autonomous sensor nodes. Advancement in the field of modern communication networks especially in the wireless network dramatically improved their accessibility,affordability and accuracy. The eavesdropping is a serious security threat to a WSN since this attack is a prerequisite to other attacks. Avoiding the major threat called eavesdropping,cryptographic techniquies are to be used. Reexamine the notion of security,accessibilty,affordability and confidentiality of the WSN, combines Shannon's cypher method and Ford-Fulkerson algorithm together with one time pad system. The idea behind the algorithm is simple. According to Ford-Fulkerson algorithm,as long as there is a path from start node to end node with available capacity on all edges in the path, send flow along one of these paths,find another path and so on.That path is called augmented path. Through this non-cooperative eavesdropping can be avoided. Ford-Fulkerson algorithm can be used along with the one time pad scheme. The one time pad scheme is a binary additive stream cipher, where stream of truly random keys are generated and then combined with the plaintext for encryption or with the ciphertext for decryption using exclusive OR addition. Because of the three important properties of this scheme one time pad scheme can accepted as the most prominent security providing mechanism,properties such as: key must be as long as the plain text, key must be truly random and key must only be used once. Main disadvantage is that one time pad scheme has a serious threat to Brute force attack. Thus for avoiding the brute force attack combines Ford-Fulkerson and ZKP along with the AES algorithm.

Authors and Affiliations

Sreelekshmi Murali

Keywords

Related Articles

 A classification of methods for frequent pattern mining

 Abstract: Data mining refers to extracting knowledge from large amounts of data. Frequent pattern mining is aheavily researched area in the field of data mining with wide range of applications. Frequent itemsets is...

 Handoff Management protocols MIPV6 and HMIPV6  Comparative analysis in 4G wireless networks

 With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS) guarantees. Instead of &nbsp...

A Survey on Different Levels of Risks during Different Phases in Data Warehouse

Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...

 Protocols for detection of node replication attack  on wireless sensor network

 Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These  a...

 A Survey on Authorization Systems for Web Applications

 Abstract: Web services are the most important point of usage for the modern web architecture. The Serviceoriented architecture (SOA) used in web services offers a simple platform for integrating heterogeneousdistri...

Download PDF file
  • EP ID EP137181
  • DOI 10.9790/0661-16585055
  • Views 82
  • Downloads 0

How To Cite

Sreelekshmi Murali (2014).  Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 50-55. https://europub.co.uk/articles/-A-137181