Self-assured Data Arrangement within Information Exhaustive Wireless Sensor Correlation

Abstract

In the corpulent number of outgrowing viable environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the familiar medium. Transferable nodes in military environments, for example, a adjoin line or ahostile area are prone to experience the undergo of irregular system network and frequent partitions. Disruption-tolerant network (DTN) modernization are getting to be fruitful results that permit remote device conveyed by officers to speak with one another and access the confidential data or secret data or summon dependably by abusing outside facility nodes or storage nodes. Thus ainnovative methodology is introduced to impart successful communication between each other in addition to access the confidential information present by some major authorities like commander or other superiors. The method is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for authorization policies and the policies update for secure data retrieval in most defiant cases. The mainlycompetent cryptographic emulsion is commenced to control the access issues called Cipher text Policy Attribute Based Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext - policy attribute-based encryption (CP-ABE) is a guaranteeing cryptographic answer for the right to gain entrance control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from various authorities. In this, we insinuate a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently.Weexpress how to apply the proposed mechanism to safely and proficiently deal with the classified information dispersed in the Interruption or disruption tolerant network . The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. specially, Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptorneeds to possess in order to decrypt the ciphertext. Thus, distinct users are allowed to decrypt dissimilar pieces of data per the security policy.

Authors and Affiliations

Radha Saranya B V, Ananth Rao G

Keywords

Related Articles

Short Term Load Forecasting OF 132/33Kv Maiduguri Transmission Substation Using Artificial Neural Network (ANN)

This paper presents a novel approach for 1 to 24 hours ahead load forecasting using multilayer perceptron (MLP) also referred to as multilayer feed forward artificial neural network (ANN) of a utility company located...

Nomadic Transmitting Alignment in File Exhaustive Wireless Networks

In this paper, we are attentive in reducing the delay and increasing the period of occurrence in wireless sensor networks for which events occur infrequently. The most of the energy is consumed in such systems when t...

Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.

While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor netwo...

A Novel Approach for Channel Estimation for MIMO-OFDM Systems Using PDP Technique

Multiple Input – Multiple Output Orthogonal frequency Division Multiplexing (MIMO-OFDM) is considered as eminent technology in the world of wireless communication such as 3rd Generation technology as well as WiMAX. T...

A Review – OFDM-RoF (Radio over Fiber) System for Wireless Network

In future generation wireless and mobile communication system must be increase with high quality bandwidth service for inaccessible area. The recent wireless network providers require high transmission bandwidth with...

Download PDF file
  • EP ID EP28244
  • DOI -
  • Views 288
  • Downloads 3

How To Cite

Radha Saranya B V, Ananth Rao G (2015). Self-assured Data Arrangement within Information Exhaustive Wireless Sensor Correlation. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28244