ADVANCED APPROACH FOR SECURE RETRIEVAL OF DATA IN DISRUPTION TOLERANT MILITARY NETWORKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Communication nodes in military environments such as a battleground regions are likely to suffer from connectivity issues in various locations in a battle field. Disruption-tolerant network (DTN) technologies are becoming promising solutions that allow wireless devices which the soldiers carry to communicate with each other and access the confidential information Some of the most facing issues in this area is the enforcement of Authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a powerful cryptographic solution to the access control issues in a secure environment. However, the problem of applying CPABE in decentralized in this paper we solve the issue of security and privacy challenges such as key escrow, attribute revocation and coordination of attributes issued by different authorities. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data by providing unique security measure using certificates by protecting the systems used and authorizing the system network.
Authors and Affiliations
Divina T. K Premdas
HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS
This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...
Impact of RZ Duty-Cycle, Dispersion Map and Nonlinearity on the Performance of 107Gbps OOK Transmission over 1000 km SSMF
The effect of the dispersion map and nonlinearity on performance of 107 Gbps on-off-keying with different return-to-zero duty-cycle over long-haul transmission is investigated by simulation. It is observed that without...
DETECTION OF COMPUTER VIRUSES USING WELM_ FMA_FABC
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_FMA_FABC to detect computer viruses. The proposed method...
A REVIEW PAPER ON OFFLINE SIGNATURE RECOGNITION SYSTEM USING GLOBAL FEATURE, ACO AND NEURAL NETWORK
Signature verification systems can be categorized as offline (static) and online (dynamic). This paper presents neural network based recognition of offline signatures system that is trained with low-resolution scanned si...
Trend Analysis of Key Cellular Network Quality Performance Metrics
Assessment and analysis of key quality performance indicators of a cellular network is better done over a period of time like days or months in order to have a proper perspective of the reliability of performance...