Efficient Trust Establishment for Secure Communication in Delay Tolerant Networks Using Attribute Based Encryption

نویسنده

  • S. Senthil Kumar
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Repetitive Trust Management and Adversary Detection for Delay Tolerant Networks

Delay Tolerant Networking (DTN) program is an emerging technology that can facilitate access to information when secure end-to-end paths cannot exist. DTNs may be turn into vulnerable during the legitimate nodes may compromise and the attacker modifies or alters the delivery constraints of the node. DTN makes use of persistence within the network nodes along with the mobility strategy to overco...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Privacy Preserving and Secure Data Retrieval in Sensor Network using Homomorphic Encryption Algorithm

The Cipher text-policy Attribute Based Encryption for secure data retrieval in decentralized Disruption Tolerant Networks (DTNs) where multiple key authorities manage their attributes independently. Immediate attribute revocation enhances backward/forward secrecy of confidential data by reducing the windows of vulnerability. Key escrow problem is resolved by an escrow-free key issuing protocol ...

متن کامل

Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach

Mechanisms for secure mobile communication can be enablers for novel applications in the area of cooperative work. In this context, this article exemplarily investigates an emergency management setting. An efficient support of emergency communication is of high practical importance, but has specific challenges: unpredictable local crisis situations harden the establishment of communication stru...

متن کامل

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are emerging to become most successful solutions which allows the wireless devices to be carried by the soldier in-order to make communication with each other and access the informatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016