ADVANCED APPROACH FOR SECURE RETRIEVAL OF DATA IN DISRUPTION TOLERANT MILITARY NETWORKS

Abstract

 Communication nodes in military environments such as a battleground regions are likely to suffer from connectivity issues in various locations in a battle field. Disruption-tolerant network (DTN) technologies are becoming promising solutions that allow wireless devices which the soldiers carry to communicate with each other and access the confidential information Some of the most facing issues in this area is the enforcement of Authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a powerful cryptographic solution to the access control issues in a secure environment. However, the problem of applying CPABE in decentralized in this paper we solve the issue of security and privacy challenges such as key escrow, attribute revocation and coordination of attributes issued by different authorities. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data by providing unique security measure using certificates by protecting the systems used and authorizing the system network.

Authors and Affiliations

Divina T. K Premdas

Keywords

Related Articles

 HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS

 This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...

Impact of RZ Duty-Cycle, Dispersion Map and Nonlinearity on the Performance of 107Gbps OOK Transmission over 1000 km SSMF

The effect of the dispersion map and nonlinearity on performance of 107 Gbps on-off-keying with different return-to-zero duty-cycle over long-haul transmission is investigated by simulation. It is observed that without...

 DETECTION OF COMPUTER VIRUSES USING WELM_ FMA_FABC

 Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_FMA_FABC to detect computer viruses. The proposed method...

A REVIEW PAPER ON OFFLINE SIGNATURE RECOGNITION SYSTEM USING GLOBAL FEATURE, ACO AND NEURAL NETWORK

Signature verification systems can be categorized as offline (static) and online (dynamic). This paper presents neural network based recognition of offline signatures system that is trained with low-resolution scanned si...

 Trend Analysis of Key Cellular Network Quality Performance Metrics

 Assessment and analysis of key quality performance indicators of a cellular network is better done over a period of time like days or months in order to have a proper perspective of the reliability of performance...

Download PDF file
  • EP ID EP90815
  • DOI 10.5281/zenodo.58603
  • Views 142
  • Downloads 0

How To Cite

Divina T. K Premdas (30).  ADVANCED APPROACH FOR SECURE RETRIEVAL OF DATA IN DISRUPTION TOLERANT MILITARY NETWORKS. International Journal of Engineering Sciences & Research Technology, 5(7), 1433-1436. https://www.europub.co.uk/articles/-A-90815