Decentralised Disruption Tolerant military Network

Authors(2) :-Mouneshwara, H.P.Mohan Kumar

Disruption Tolerant Network technologies allow wireless devices carried by soldiers in military networks and access the confidential information by storage nodes. Data to be stored and retrieved from storage nodes, since the data handled by the soldiers are different, it is necessary to implement the security policy and access control policy to them. The authorization policies and secure data retrieval by soldiers are the key issues in DTN. Ciphertext Policy Attribute Based Encryption is a cryptographic resolution to the access control issues and fulfills the necessities for secure text retrieval in DTNs. To transmitting the secret image in DTN, Visual Cryptography Schemes are used. These schemes are used to hide the secret information in images. To support both text and image retrieval in DTN, the proposed algorithm can be enhanced. However, previous approach suffers attribute revocation problem in information, pixel expansion and noise problem in images. The proposed system provides secured retrieval of text and image, using Multiauthority CP-ABE with Data Revocation and customized GAS algorithm for decentralized disruption tolerant military network respectively. On demonstrating the proposed system, the private information is secured and efficiently managed in Disruption Tolerant Military Network.

Authors and Affiliations

MCA Department, P.E.S. College of Engineering, Mandya, Karnataka, India
H.P.Mohan Kumar
MCA Department, P.E.S. College of Engineering, Mandya, Karnataka, India

Access-control, Attribute-based encryption (ABE), Interruption-tolerant Network (ITN), Multiauthority, Secure Data Retrieval.

  1. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop:Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1-11.
  2. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption withef?cientrevocation,”inProc.ACMConf.Comput.Commun.Security, 2008, pp. 417-426.
  3. M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37-48. 
  4. S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009. 
  5. M. Chuah and P. Yang, “Performance evaluation of contentbased information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1-7. 6M. Kallahalla, E. Riedel, R.  
  6. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable secure file sharing on untrusted storage,” in Proc.Conf. File Storage Technol., 2003, pp. 29-42. 
  7. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. WISA, 2009, LNCS 5932, pp. 309-323. 
  8. N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,” in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1-8. 

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 847-850
Manuscript Number : CSEIT1723263
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Mouneshwara, H.P.Mohan Kumar, "Decentralised Disruption Tolerant military Network", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.847-850, May-June-2017.
Journal URL :

Article Preview