Protect Knowledge Retrieval for Localized Disruption Tolerant Military Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-24 Number-3
Year of Publication : 2015
Authors : B. Srihari, K.V.G.N.Naidu, P. Nirupama
DOI :  10.14445/22312803/IJCTT-V24P124

MLA

B. Srihari, K.V.G.N.Naidu, P. Nirupama "Protect Knowledge Retrieval for Localized Disruption Tolerant Military Networks". International Journal of Computer Trends and Technology (IJCTT) V24(3):108-112, June 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.

References
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” in Proc. IEEE INFOCOM, 2006, pp. 1–11.
[2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp. 1–6.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37–48.
[4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
[6] J.Saranya , P.Ilango,"Efficient Information Retrieval By Using Multi- Modality Manifold Ranking Based On Syntactic/Semantic Measurement"International Journal of Computer Trends and Technology (IJCTT),V4(9):3311-3315 September Issue 2013
[7] CH.Sivaram Prasad , T.Venu , N.Subhash Chandra, A New Design for Deduce User Search Results with Feedback Sessions, International Journal of Computer Trends and Technology (IJCTT) – volume 15 number 2 – Sep 2014
[8] Tariq O. Fadl Elsid, Mirghani. A. Eltahir, "Data Mining: Classification Techniques of Students’ Database A Case Study of the Nile Valley University, North Sudan", International Journal of Computer Trends and Technology (IJCTT) – volume 16 number 5 – Oct 2014

Keywords
Put your keywords here, keywords are separated by comma.