A Trust Directing System for Wireless Sensor Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 1
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text policy attribute-based encryption (CPABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CPABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
Authors and Affiliations
SK. Shahida, SK. Shahina
Effect of Different Levels of Water Soluble NPK(20-20-20) Fertilizers on the Growth and Yield of Carrot (Daucus Carota l.) by Using Drip Irrigation Technology
Fertilizers application plays an important in the production of fruits and vegetables. Over-application of fertilizers can slow down the growth and development of fruits and vegetables. The present research work was car...
A New Bio Mathematical Model to Find the Age Specific Coronary Heart Disease Mortality Rates Using Takacs Formula
The gender difference (gender gap) in mortality due to coronary heart disease (CHD) decreases with age. This relationship has not been well characterized in diverse populations. To examine the gender gap in coronary hea...
Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network
Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although the identity of a node can be verified through cryptographic authentication, conventiona...
Finite Element Structural Analysis of Automobile Camshaft
This Cam is a Mechanical Linkage utilized particularly in changing turning movement into straight movement. Its principle capacity is to control the valve timing in I.C Engines. In the present work we are composed Autom...
Lossless Color Image Compression by Predictive Approaches: A Survey
There are numerous applications of image compression, such as the space imaging, medical imaging, classic and digital imaging where the size of images or image stream is too large and requires a large amount of space fo...