A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 1
Abstract
Generally Networks operated in ad hoc mode suffer isolated network connectivity in the Hostile Military environments like battlefield. Deployment of Disruption-tolerant networks (DTN) enhances the connectivity between wireless devices carried by soldiers in battle field, this provides them to communicate effectively and share the information confidently. Cipertext -policy attribute based encryption (CP-ABE) is effective cryptographic technique to access control issues. Ad hoc network are decentralized and resource constrained networks, applying CP-ABE to such networks is a challenging issue, in turn it introduces new security and privacy issues related to attribute revocation, coordination of attributes, and key escrow. This paper mainly focuses on a secure data collection mechanism using CP-ABE for ad hoc DTNs where more than one key authority manages their attributes dynamically and independently. We analyzed the proposed mechanism and applied to the disruptiontolerant military network to access the information securely.
Authors and Affiliations
A. Radhika| Sr.Asst.Professor, Dept. of CSE, D. VaraLaxmi| M.Tech(CS),Dept. of CSE, S.R.K Instt. Of Technology Andhra Pradesh, INDIA
To Provide An Innovative Policy Anomaly Management Framework For Firewalls
Firewalls have been widely organized on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to choose whether to accept or discard the packet based on its policy. Optimizing...
Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus
Today we are having tremendous growth on cross technologies but these technology is limited on interconnected networks. We are having delay for these networks our major goal is prune delay this type of networks but i...
Network Intrusion Detection Systems Using Genetic Algorithm
Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect...
Collective Conviction Based Confidentiality Sustain Endorsement Procedure in Cloud Computing
Cloud computing is consistently growing as a typical for sharing the knowledge over the remote warehousing in a web cloud server. Cloud administrations offers awing enhancements for the purchasers to understand the on...
Green Internet Routing Between Traffic Volume and Power Consumption
We plan a green Internet routing plan, where the routing can lead movement in a way that is green. We contrast from past reviews where they switch organize parts, for example, line cards and routers, into rest mode....