Open Access Open Access  Restricted Access Subscription Access

Password Verification in Military Networks by using Secure Hash Algorithm


Affiliations
1 Department of Electronics and Computer Engineering, Koneru Lakshmaish University, Guntur District - 522502, Andhra Pradesh, India
 

Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they suffer from intermittent network property. They are having frequent partitions. Disruption-tolerant network DTN technologies are may be a true and simple solutions. DTN is a Disruption-tolerant network. Findings: These devices take the counseling or control dependably by extending memory module nodes. In these networking environments DTN is extremely successful technology. Once there's no wired affiliation in between supply and destination device, data from supply node need to wait within middle nodes for oversized quantity for your duration until the affiliation would be properly established. One amongst the difficult approach may be a ABE. That’s attribute-based coding that   fulfill the requirements to get secure data extraction through DTNs. Here the conception is Cipher text Policy ABE (CP-ABE). Improvement:  It provides the applicable means of coding of knowledge. The coding includes the dataset that the secret writing must possess so as to decrypt the cipher text. Hence, different type of users may be given to decrypt complete different components of knowledge in line with the safety policy.


Keywords

CP-ABE, DTN, Military Networks, Password, Secure Hash Algorithm.
User

Abstract Views: 205

PDF Views: 0




  • Password Verification in Military Networks by using Secure Hash Algorithm

Abstract Views: 205  |  PDF Views: 0

Authors

Sai Ram Kiran Konduri
Department of Electronics and Computer Engineering, Koneru Lakshmaish University, Guntur District - 522502, Andhra Pradesh, India
T. Anuradha
Department of Electronics and Computer Engineering, Koneru Lakshmaish University, Guntur District - 522502, Andhra Pradesh, India
K. Vishnu
Department of Electronics and Computer Engineering, Koneru Lakshmaish University, Guntur District - 522502, Andhra Pradesh, India
Gireesh Kota
Department of Electronics and Computer Engineering, Koneru Lakshmaish University, Guntur District - 522502, Andhra Pradesh, India

Abstract


Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they suffer from intermittent network property. They are having frequent partitions. Disruption-tolerant network DTN technologies are may be a true and simple solutions. DTN is a Disruption-tolerant network. Findings: These devices take the counseling or control dependably by extending memory module nodes. In these networking environments DTN is extremely successful technology. Once there's no wired affiliation in between supply and destination device, data from supply node need to wait within middle nodes for oversized quantity for your duration until the affiliation would be properly established. One amongst the difficult approach may be a ABE. That’s attribute-based coding that   fulfill the requirements to get secure data extraction through DTNs. Here the conception is Cipher text Policy ABE (CP-ABE). Improvement:  It provides the applicable means of coding of knowledge. The coding includes the dataset that the secret writing must possess so as to decrypt the cipher text. Hence, different type of users may be given to decrypt complete different components of knowledge in line with the safety policy.


Keywords


CP-ABE, DTN, Military Networks, Password, Secure Hash Algorithm.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i17%2F132866