Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks


Affiliations
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India
     

   Subscribe/Renew Journal


In worldwide environment to transfer the data in secure fashion everything is rely on another source to transfer the data to corresponding receiver without any data loss during transmission. [9] In military areas like battlefield or an unfriendly region are likely to undergo from improper network connectivity and often partitions. A method is implemented to provide successful communication between source and destination as well as access the confidential information provided by some major authorities like commander or other superiors. The method is said to be Disruption-Tolerant Network (DTN). The [4] DTN system provides a well-planned outline for authenticating the user’s policies and those policies to retrieve the secure data in most challenging cases. The cryptographic solution is introduced to control the unauthorized access issues called Ciphertext Policy Attribute Based Encryption (CP-ABE) [1]. On the other hand, Disruption-tolerant networks introduce lot of security and privacy challenge with regard to the attribute digital certificate, key exchange, and collaboration of attributes issued from various authorities. The DTN is used to authorize the nodes and DTN registers the node details to key Authority. The key Authority generates private Key and the route to transfer packet to destination.  Secret key is also automatically changed when the node joins a network and leaves a network by which the level of security is increased.


Keywords

Access Control, AMP (Advance Mail Port), CP-ABE (Ciphertext Attribute Based Encryption), Commander, DTN (Disruption-Tolerant Network), Guard, Secure Data Retrieval.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 218

PDF Views: 2




  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Abstract Views: 218  |  PDF Views: 2

Authors

G. Swathika
Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India
R. Vijayalakshmi
Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India

Abstract


In worldwide environment to transfer the data in secure fashion everything is rely on another source to transfer the data to corresponding receiver without any data loss during transmission. [9] In military areas like battlefield or an unfriendly region are likely to undergo from improper network connectivity and often partitions. A method is implemented to provide successful communication between source and destination as well as access the confidential information provided by some major authorities like commander or other superiors. The method is said to be Disruption-Tolerant Network (DTN). The [4] DTN system provides a well-planned outline for authenticating the user’s policies and those policies to retrieve the secure data in most challenging cases. The cryptographic solution is introduced to control the unauthorized access issues called Ciphertext Policy Attribute Based Encryption (CP-ABE) [1]. On the other hand, Disruption-tolerant networks introduce lot of security and privacy challenge with regard to the attribute digital certificate, key exchange, and collaboration of attributes issued from various authorities. The DTN is used to authorize the nodes and DTN registers the node details to key Authority. The key Authority generates private Key and the route to transfer packet to destination.  Secret key is also automatically changed when the node joins a network and leaves a network by which the level of security is increased.


Keywords


Access Control, AMP (Advance Mail Port), CP-ABE (Ciphertext Attribute Based Encryption), Commander, DTN (Disruption-Tolerant Network), Guard, Secure Data Retrieval.