A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks

Abstract

Generally Networks operated in ad hoc mode suffer isolated network connectivity in the Hostile Military environments like battlefield. Deployment of Disruption-tolerant networks (DTN) enhances the connectivity between wireless devices carried by soldiers in battle field, this provides them to communicate effectively and share the information confidently. Cipertext -policy attribute based encryption (CP-ABE) is effective cryptographic technique to access control issues. Ad hoc network are decentralized and resource constrained networks, applying CP-ABE to such networks is a challenging issue, in turn it introduces new security and privacy issues related to attribute revocation, coordination of attributes, and key escrow. This paper mainly focuses on a secure data collection mechanism using CP-ABE for ad hoc DTNs where more than one key authority manages their attributes dynamically and independently. We analyzed the proposed mechanism and applied to the disruptiontolerant military network to access the information securely.

Authors and Affiliations

A. Radhika| Sr.Asst.Professor, Dept. of CSE, D. VaraLaxmi| M.Tech(CS),Dept. of CSE, S.R.K Instt. Of Technology Andhra Pradesh, INDIA

Keywords

Related Articles

To Provide An Innovative Policy Anomaly Management Framework For Firewalls

Firewalls have been widely organized on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to choose whether to accept or discard the packet based on its policy. Optimizing...

Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus

Today we are having tremendous growth on cross technologies but these technology is limited on interconnected networks. We are having delay for these networks our major goal is prune delay this type of networks but i...

Network Intrusion Detection Systems Using Genetic Algorithm

Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect...

Collective Conviction Based Confidentiality Sustain Endorsement Procedure in Cloud Computing

Cloud computing is consistently growing as a typical for sharing the knowledge over the remote warehousing in a web cloud server. Cloud administrations offers awing enhancements for the purchasers to understand the on...

Green Internet Routing Between Traffic Volume and Power Consumption

We plan a green Internet routing plan, where the routing can lead movement in a way that is green. We contrast from past reviews where they switch organize parts, for example, line cards and routers, into rest mode....

Download PDF file
  • EP ID EP16725
  • DOI -
  • Views 320
  • Downloads 11

How To Cite

A. Radhika, D. VaraLaxmi (2016). A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks. International Journal of Science Engineering and Advance Technology, 4(1), 66-70. https://europub.co.uk/articles/-A-16725