Decentralised Disruption Tolerant military Network

Authors

  • Mouneshwara  MCA Department, P.E.S. College of Engineering, Mandya, Karnataka, India
  • H.P.Mohan Kumar  MCA Department, P.E.S. College of Engineering, Mandya, Karnataka, India

Keywords:

Access-control, Attribute-based encryption (ABE), Interruption-tolerant Network (ITN), Multiauthority, Secure Data Retrieval.

Abstract

Disruption Tolerant Network technologies allow wireless devices carried by soldiers in military networks and access the confidential information by storage nodes. Data to be stored and retrieved from storage nodes, since the data handled by the soldiers are different, it is necessary to implement the security policy and access control policy to them. The authorization policies and secure data retrieval by soldiers are the key issues in DTN. Ciphertext Policy Attribute Based Encryption is a cryptographic resolution to the access control issues and fulfills the necessities for secure text retrieval in DTNs. To transmitting the secret image in DTN, Visual Cryptography Schemes are used. These schemes are used to hide the secret information in images. To support both text and image retrieval in DTN, the proposed algorithm can be enhanced. However, previous approach suffers attribute revocation problem in information, pixel expansion and noise problem in images. The proposed system provides secured retrieval of text and image, using Multiauthority CP-ABE with Data Revocation and customized GAS algorithm for decentralized disruption tolerant military network respectively. On demonstrating the proposed system, the private information is secured and efficiently managed in Disruption Tolerant Military Network.

References

  1. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop:Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1-11.
  2. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption withefficientrevocation,”inProc.ACMConf.Comput.Commun.Security, 2008, pp. 417-426.
  3. M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37-48. 
  4. S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009. 
  5. M. Chuah and P. Yang, “Performance evaluation of contentbased information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1-7. 6M. Kallahalla, E. Riedel, R.  
  6. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29-42. 
  7. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309-323. 
  8. N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1-8. 

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mouneshwara, H.P.Mohan Kumar, " Decentralised Disruption Tolerant military Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.847-850, May-June-2017.