Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network
Journal Title: EMITTER International Journal of Engineering Technology - Year 2016, Vol 4, Issue 1
Abstract
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms, we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.
Authors and Affiliations
Samsul Huda, Amang Sudarsono, Tri Harsono
Evacuation System in a Building Using Cellular Automata for Pedestrian Dynamics
The sense of safety in public facilities for pedestrians can be shown by the availability of good infrastructure, particularly the building. One of the aspects that can make pedestrians feel comfortable and safe is the a...
Applicationof Computer Visionfor Polishing RobotinAutomotive Manufacturing Industries
Polishing is a highly skilled manufacturing process with a lot of constraints and interaction with environment. In general, the purpose of polishing is to get the uniform surface roughness distributed evenly throughout p...
Hybrid Modeling KMeans – Genetic Algorithms in the Health Care Data
K-Means is one of the major algorithms widely used in clustering due to its good computational performance. However, K-Means is very sensitive to the initially selected points which randomly selected, and therefore it do...
Semantic Madurese Batik Search with Cultural Computing of Symbolic Impression Extraction and Analytical Aggregation of Color, Shape and Area Features
Lack of information media about Madurese batik causes low awareness of younger generation to maintain the production of Madurese batik. Actually, Madurese Batik also has a high philosophy, which the motif and colour refl...
Reduction of Total Harmonic Distortion (THD) on Multilevel Inverter with Modified PWM using Genetic Algorithm
In this research, modified PWM has been applied to the multilevel inverter (MLI) single-phase three-level diode clamp full bridge. Modified PWM is performed to produce minimum Total Harmonic Distortion (THD) the voltage...