This paper is published in Volume-3, Issue-3, 2017
Area
PHP
Author
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar
Org/Univ
Krishnasamy College Of Engineering And Technology, Anna University, Tamil Nadu, India
Keywords
Data Retrieval, Encrypt, Decrypt, Storage Node, Cipher text-policy.
Citations
IEEE
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar. Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar (2017). Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.
MLA
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar. "Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar. Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar (2017). Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.
MLA
Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar. "Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Disruption- tolerant network (DTN) technologies are becoming successful solutions that allow nodes to communicate with each other in these extreme networking environments. Typically, when there is no end-to-end connection between a source and a destination pair, the messages from the source node may need to wait in the intermediate nodes for a substantial amount of time until the connection would be eventually established. The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. Especially, Cipher text-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encrypt defines the attribute set that the decrypt needs to possess in order to decrypt the cipher text. Thus, different users are allowed to decrypt different pieces of data per the security policy.