A Trust Directing System for Wireless Sensor Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 1
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text policy attribute-based encryption (CPABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CPABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
Authors and Affiliations
SK. Shahida, SK. Shahina
Survey of Data Mining Tools and Techniques for Customer Relationship Management (CRM)
The domain of Customer Relationship Management (CRM) has been gaining significance in various business management processes. CRM includes all the series of action that an organization uses to create and establish good...
Taguchi Approach for Experimental Investigation to Minimize Surface Roughness for Turning EN 24 Steel
The main aim of this paper is to optimize the material removal rate (MRR) in turning process. Taguchi methodology is used as an optimization tool to optimize the turning process. The input parameters for turning process...
POS Tagging of Hindi-English Code Mixed Text from Social Media
Language is way of expressing ideas and feelings using movement, symbol and sounds; particular style of speaking and writing. Language is divided into two, spoken language and written language. Spoken language is a form...
Study and Implementation of 3 Stage Quantum Cryptography in Optical Networks
This paper presents a quantum protocol based on public key cryptography for secure transmission of data over a public channel. The security of the protocol derives from the fact that Alice and Bob each use secret keys i...
Dial a Ride Problem
Generally we have seen in metro cities transport problem, even we have multiple options like city buses, metro trains, cab facilities, taxies etc. Every day cab and taxi organizations getting thousands of requests, due...