Open Access   Article Go Back

Secured Data Retrieval Disruption Tolerant Network

Pushpraj Deshkar1 , Amit Pampatwar2 , Raana Syeda3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 101-104, May-2019

Online published on May 12, 2019

Copyright © Pushpraj Deshkar, Amit Pampatwar, Raana Syeda . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pushpraj Deshkar, Amit Pampatwar, Raana Syeda, “Secured Data Retrieval Disruption Tolerant Network,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.101-104, 2019.

MLA Style Citation: Pushpraj Deshkar, Amit Pampatwar, Raana Syeda "Secured Data Retrieval Disruption Tolerant Network." International Journal of Computer Sciences and Engineering 07.12 (2019): 101-104.

APA Style Citation: Pushpraj Deshkar, Amit Pampatwar, Raana Syeda, (2019). Secured Data Retrieval Disruption Tolerant Network. International Journal of Computer Sciences and Engineering, 07(12), 101-104.

BibTex Style Citation:
@article{Deshkar_2019,
author = {Pushpraj Deshkar, Amit Pampatwar, Raana Syeda},
title = {Secured Data Retrieval Disruption Tolerant Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {101-104},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1054},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1054
TI - Secured Data Retrieval Disruption Tolerant Network
T2 - International Journal of Computer Sciences and Engineering
AU - Pushpraj Deshkar, Amit Pampatwar, Raana Syeda
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 101-104
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.

Key-Words / Index Term

Internet of Things, machine learning, cloud data, forecasting, load

References

[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop:Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
[2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM
[4] S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM,
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
[7]. Wang, L.M.; Shi, Y. Patrol detection for replica attacks on wireless sensor networks. Sensors 2011, 11, 2496–2504.
[8]. Zhu, S.; Setia, S.; Jajodia, S.; Ning, P.Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sensor Netw. 2007.