Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Authors

  • Molkar Rajkumar  Assistant Professor, Department of Computer Science and Engineering, K G Reddy college of Engineering and Technology, Moinabad, Hyderabad, Telangana, India

Keywords:

DTN, CP-ABE, Cipher Text, Attributes.

Abstract

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer fromm intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are developing to wind up best arrangements which permits the remote gadgets to be conveyed by the trooper keeping in mind the end goal to make correspondence with each other and access the data that are secret or orders are made solid by misusing the outside capacity hubs. There are the absolute most difficult issues exhibit in this situation, they are requirement of approval strategy and strategies that are refreshed for handling the information recovery in a safe way. Figure content arrangement quality based encryption (CPABE) is a huge answer for cryptography keeping in mind the end goal to get to the control issues. The issue of executing the CP-ABE is a de-concentrated DTNs causes numerous security and security challenges with respect to property renouncement key escrow, and co-ordinates of qualities given from various experts. In this paper, we propose a protected plan for recovery of information utilizing CP-ABE for de-incorporated DTNs where the experts of numerous key take care of their trait freely. We outline how to apply the proposed framework to deal with the private information with security and proficiency, appropriated in the Disruption-tolerant military systems.

References

  1. JunbeomHur and Kyungtae Kang, Member, IEEE,ACM "Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks"-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.
  2. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "Maxprop: Routing for vehicle-based disruption tolerant networks," in Proc. IEEE INFOCOM, 2006,pp. 1-11.
  3. M. Chuah and P.Yang,"Node density-based adaptive routing scheme for disruption tolerant networks," in Proc. IEEE MILCOM, 2006, pp. 1-6.
  4. M. M. B. Tariq, M. Ammar, and E. Zequra, "Message ferry route de- sign for sparse ad hoc networks with mobile nodes," in Proc. ACM MobiHoc, 2006, pp. 37-48.
  5. S.Royand,Chuah,"Secure data retrieval based on cipher text policy attribute-based encryption (CPABE)system for the DTNs," Lehigh CSE Tech. Rep.,2009.
  6. M. Chuah and P. Yang, "Performance evaluation of content-based information retrieval schemes for DTNs," in Proc. IEEE MILCOM, 2007, pp. 1-7.
  7. A.LewkoandB.Waters,"Decentralizing attribute-based encryption," Cryptology ePrint Archive: Rep. 2010/351, 2010.
  8. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Eurocrypt, 2005, pp. 457-473.
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf.Comput.Commun.Security,2006,pp.89-98.
  10. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertextpolicy attribute- based encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
  11. R. Ostrovsky, A. Sahai, and B. Waters, "Attributebased encryption with non-monotonic access structures," in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195-203.
  12. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing withattributerevocation,"in Proc.ASIACCS,2010,pp.261-270.
  13. A.Boldyreva,V.Goyal,andV.Kumar,"Identity-based encryption with efficient revocation,"in Proc.ACM Conf.Comput.Commun. Security, 2008, pp. 417-426.
  14. RafaeliandD.Hutchison,"A survey of key management for secure group communication," Comput. Surv., vol. 35, no. 3, pp. 309-329, 2003

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Molkar Rajkumar, " Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.608-613, May-June-2018.