Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks  
  Authors : Shanmugasundaram. S; Chitra. S; Lokesh. V
  Cite as:

 

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are emerging to become most successful solutions which allows the wireless devices to be carried by the soldier in-order to make communication with each other and access the information that are confidential or commands are made reliable by exploiting the external storage nodes. There are some of the most challenging issues present in this scenario, they are enforcement of authorization policy and policies that are updated for processing the data retrieval in a secure manner. Cipher text policy attribute-based encryption (CPABE) is a significant solution for cryptography in-order to access the control issues. The problem of implementing the CP-ABE is a de-centralized DTNs origins many security and privacy challenges regarding to attribute revocation key escrow, and co-ordinates of attributes given from different authorities. In this paper, we propose a secure scheme for retrieval of data using CP-ABE for de-centralized DTNs where the authorities of multiple key look after their attribute independently. We illustrate how to apply the proposed system to manage the confidential data with security and efficiency, distributed in the Disruption-tolerant military networks.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 426 - 430

Figures : 01

Tables : --

Publication Link : Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

 

 

 

Shanmugasundaram. S : M. Tech. Student, Department of Computer Science and Engineering Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry.

Chitra. S : Assistant Professor, Department of Information Technology Manakula Vinayagar Institute of Technology Pondicherry University, Pondicherry.

Lokesh. V : M. Tech. Student, Department of Computer Science and Engineering Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry.

 

 

 

 

 

 

 

DTN

CP-ABE

Cipher Text

Attributes

The DTN techniques are emerging to be the most effective solution in military applications that let the wireless devices to interact with each other and access the confidentially secure information consistently by exploiting the external storage nodes. CP-ABE is an ascendable cryptographic solution to the access control and retrieval of secure data issues. In this paper, we proposed an well-organized and secure data retrieval method using CP-ABE for decentralized DTNs where the attributes are autonomously managed by multiple key authorities. The characteristic key escrow problem is determined, such that the security of the stored data is guaranteed even in the hostile environment where the key authorities may be compromised or untrusted. The revocation for fine-grained key can also be done for each attribute group in addition. We elucidate how to apply the proposed system in order to manage the confidential data distributed in disruption-tolerance military network in a secured and efficient manner.

 

 

 

 

 

 

 

 

 

[1] JunbeomHur and Kyungtae Kang, Member, IEEE, ACM “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks”-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014. [2] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11. [3] M. Chuah and P.Yang,“Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp. 1–6. [4] M. M. B. Tariq, M. Ammar, and E. Zequra, “Message ferry route de- sign for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37– 48. [5] S.Royand,Chuah,“Secure data retrieval based on cipher text policy attribute-based encryption (CPABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009. [6] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7. [7] A.LewkoandB.Waters,“Decentralizing attribute-based encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010. [8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf.Comput.Commun.Security,2006,pp.89–98. [10] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attribute- based encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp. 321–334. [11] R. Ostrovsky, A. Sahai, and B. Waters, “Attributebased encryption with non-monotonic access structures,” in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195–203. [12] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing withattributerevocation,”in Proc.ASIACCS,2010,pp.261–270. [13] A.Boldyreva,V.Goyal,andV.Kumar,“Identity-based encryption with efficient revocation,”in Proc.ACM Conf.Comput.Commun. Security, 2008, pp. 417–426. [14] RafaeliandD.Hutchison,“A survey of key management for secure group communication,” Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003