ADVANCED APPROACH FOR SECURE RETRIEVAL OF DATA IN DISRUPTION TOLERANT MILITARY NETWORKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Communication nodes in military environments such as a battleground regions are likely to suffer from connectivity issues in various locations in a battle field. Disruption-tolerant network (DTN) technologies are becoming promising solutions that allow wireless devices which the soldiers carry to communicate with each other and access the confidential information Some of the most facing issues in this area is the enforcement of Authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a powerful cryptographic solution to the access control issues in a secure environment. However, the problem of applying CPABE in decentralized in this paper we solve the issue of security and privacy challenges such as key escrow, attribute revocation and coordination of attributes issued by different authorities. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data by providing unique security measure using certificates by protecting the systems used and authorizing the system network.
Authors and Affiliations
Divina T. K Premdas
STRUCTURAL ANALYSIS OF A SUBMERGED COMPOSITE HULL, INTENDED FOR OIL RECOVERY FROM SHIPWRECKS
In the present work, the survivability of a submerged structure against hydrostatic loads, imposed by the operational environment, such as hydrostatic pressure due to depth, is presented. The structure under consid...
RELIABILITY EVALUATION OF WIND POWER PLANT – A CASE STUDY
Rapid technological progress, combined with falling costs, a better understanding of financial risk and a growing appreciation of wider benefits, means that renewable energy is increasingly seen as the best solution....
SYSTEMATIC ERROR-CORRECTING CODES IMPLEMENTATION FOR MATCHING OF DATA ENCODED
The Architecture used for matching the data protected with an error-correcting code (ecc) presented in my project to reduce the latency and complexity. The proposed architecture parallelizes the comparison of the...
Thermal Biometrics: A New Approach in Biometrics Detection
Authentication and verification in any system environment has become a very crucial part in today’s age. There are many methods to verify personality or validate anyone. This field is started right from the use of...
A REVIEW: OPTICAL FREQUENCY COMB GENERATOR (OFCG)
With the recent breakthrough in the field of optical frequency measurement and synthesis, it is now possible to accurately measure the frequency of optical frequency signals, generate arbitrary waveform light pulses and...