Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant Military Networks
Atish D. Buddhe , Prof. Hirendra R. Hajare, , ,
Affiliations BIT Ballarpur Gondwana University ,India
Nowadays Disruption tolerant network technologies are getting to be distinctly well known that permit wireless devices supported by soldiers to communicate with each other and access the confidential information or command consistently by abusing external storage nodes. The absolute most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using IDEA for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to productively deal with the classified information conveyed in the distributed in the disruption-tolerant military network.
Atish Budhhe, Prof. Hirendra R. Hajare ," Secure Data Communication Using IDEA for Decentralized Disruption-Tolerant MilitaryNetworks”, International Journal Of Computer Engineering In Research Trends, 3(12):625-628,December-2016.
 J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: outing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
 M. Chuah and P. Yang, “Node density-based adap-tive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1,6.
 M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
 S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption () system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
 M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM,2007, pp. 1–7.
 M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on un-trusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.