Military Networks by Disruption Tolerant Network Technology
نویسنده
چکیده
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some purpose (for ex-ample, moving their region), or some personal keys could be compromised, key revocation (or update) for every attribute is in any single user in an attribute cluster would have an effect on the opposite users within the cluster. For ex-ample, if a user joins or leaves associate and decentralized to all or any the opposite members within the same cluster for backward or rekeying procedure, or security degradation as a result of the windows of vulnerability if the previous attribute key's not
منابع مشابه
Adding Quality of Service to Disruption Tolerant Networking Using the Orwar Routing Protocol for Use in Military Manets
As armed forces become more technologically advanced, so does the need to effectively use this technology increase. One of the developments within the military for the past years is its increasing networking capabilities. Mobile ad-hoc networks are used in the military environment to increase cohesiveness between units and improve their efficiency. These networks however have to operate in host...
متن کاملPrivacy Preserving and Secure Data Retrieval in Sensor Network using Homomorphic Encryption Algorithm
The Cipher text-policy Attribute Based Encryption for secure data retrieval in decentralized Disruption Tolerant Networks (DTNs) where multiple key authorities manage their attributes independently. Immediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Key escrow problem is resolved by an escrow-free key issuing protocol ...
متن کاملSecure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are emerging to become most successful solutions which allows the wireless devices to be carried by the soldier in-order to make communication with each other and access the informatio...
متن کاملAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploitin...
متن کاملSecure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most enco...
متن کامل