SECURE DATA RETRIEVAL FOR DECENTRALIZED
DISRUPTION-TOLERANT MILITARY NETWORKS
ABSTRACT:
Mobile nodes in military environments such as a
battlefield or a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant network (DTN)
technologies are becoming successful solutions that allow wireless devices
carried by soldiers to communicate with each other and access the confidential
information or command reliably by exploiting external storage nodes. Some of
the most challenging issues in this scenario are the enforcement of
authorization policies and the policies update for secure data retrieval.
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising
cryptographic solution to the access control issues. However, the problem of
applying CP-ABE in decentralized DTNs introduces several security and privacy
challenges with regard to the attribute revocation, key escrow, and
coordination of attributes issued from different authorities. In this paper, we
propose a secure data retrieval scheme using CP-ABE for decentralized DTNs
where multiple key authorities manage their attributes independently. We
demonstrate how to apply the proposed mechanism to securely and efficiently
manage the confidential data distributed in the disruption-tolerant military
network.
EXISTING SYSTEM:
In
Many military network scenarios, connections of wireless devices carried by
soldiers may be temporarily disconnected by jamming, environmental factors, and
mobility, especially when they operate in hostile environments. Disruption- tolerant
network (DTN) technologies are becoming successful solutions that allow nodes
to communicate with each other in these extreme networking environments.
Typically, when there is no end-to-end connection between a source and a
destination pair, the messages from the source node may need to wait in the
intermediate nodes for a substantial amount of time until the connection would
be eventually established.
DISADVANTAGES OF
EXISTING SYSTEM:
v Two
or more keys to manage a dynamic attributes.
v DTNs introduces several security and privacy
challenges
PROPOSED
SYSTEM:
In this paper, we propose a secure data retrieval
scheme using CP-ABE for decentralized DTNs where multiple key authorities manage
their attributes independently. We demonstrate how to apply the proposed
mechanism to securely and efficiently manage the confidential data distributed in
the disruption-tolerant military network.
ADVANTAGES OF PROPOSED
SYSTEM:
v
The key authority can decrypt every
ciphertext addressed to specific users by generating their attribute keys.
v
Using Key revocation method.
SYSTEM
ARCHITECTURE:
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 512 MB(min)
Hard
Disk - 40 GB
Key
Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - LCD/LED
SOFTWARE
REQUIREMENTS:
Operating
system : Windows XP.
Coding
Language : .Net
Data
Base : SQL Server 2005
Tool : VISUAL STUDIO 2008.
REFERENCE:
Junbeom
Hur and Kyungtae Kang, Member, IEEE, ACM, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military
Networks” IEEE/ACM TRANSACTIONS ON NETWORKING Volume: 22, Issue: 1 Feb.
2014
No comments:
Post a Comment