Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 5, Pages: 1-13
M. S. Sarath Chandra* , K. Raghava Rao and Mohammed Ali Hussain
Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India; [email protected], [email protected], [email protected]
*Author For Correspondence
M. S. Sarath Chandra Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, India; [email protected]
Wireless Sensor Nodes in military situations, for example, a war zone or an unfriendly locale are liable to experience the ill effects of discontinuous system network. Objective: To design an efficient data recovery scheme for Decentralized DTNs in military environments, based on CP-ABE methodology, making Security the utmost prioritized characteristic. Analysis: Latest Innovations in Disruption Tolerant Networks (DTN) are getting to be effective arrangements, that permit mobile devices carried by military personnel to correspond with one another and access the classified data or to command effectively by manipulating the independent-autonomous repository nodes. Out of these, the most difficult issues in the situation are the authorization strategies and those approaches’ improvisation for secure data recovery. Methodology: Cipher text Policy-Attribute Based Encryption (CP-ABE) is a promising cryptographic technique to address the access authority issues. The issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges like attribute revoke, key security, and regulation of attributes issued from distinct authorities. So, we implement CP-ABE along with 2PC (Two Phase Commit) protocol and where numerous key authorities deal with their attributes autonomously to overcome the above mentioned challenges. Findings/Improvements: We implement the proposed System as a standalone application in Eclipse IDE. We’ve been successful in implementing this system to achieve the security requirements we’ve been discussing at length in the paper and we’ve demonstrated how to recover the data in very hostile military environments in an efficient and a secured manner.
Keywords: Attribute Based Encryption, Collusion Protection, Data Confidentiality, Decentralized Key Authorities, Disruption Tolerant Networks, Forward and Backward Secrecy, Military Networks, Privileged Access Permissions, Secured Data Sharing, Wireless Sensor Networks
Subscribe now for latest articles and news.