A Study On Secured Data Transfer Over Disruption Tolerant Networks

2182 Words9 Pages
A study on Secured Data Transfer over Disruption Tolerant Networks Krishna Kaushik Tadikonda 12/29/2014 Table of Contents 1. Literature Review 2. Existing Techniques 3. Research Agenda 4. Proposed Solution 5. Timeline 6. Bibliography Literature Review In complex military network scenarios, wireless devices connections carried by soldiers may be temporarily disconnected by jamming, some environmental factors, and more importantly mobility, especially when they operate in combative environments. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow nodes to communicate with each other in these extreme wireless-networking environments. In a typical scenario, when there is no possibility…show more content…
In this case, there is scope for reasonable assumption that multi-key authority for managing their own dynamic attributes for soldiers in their corresponding deployed regions, which could be frequently changed (e.g., the data representing location of soldiers on move). We refer to this model DTN architecture where multiple authorities can issue and manage their own attribute keys independently as a decentralized network. ABE can be implemented in two ways called Key policy Attribute Based Encryption (KP-ABE) and Ciphertext-policy Attribute Based Encryption (CP-ABE). In CP-ABE scheme, the textcipher is encrypted with an access policy chosen by an encryptor like commander, but this key is going to be created with respect to a set of attributes. CP-ABE is more appropriate to decentralized DTNs than KP-ABE because this scheme enables encryptors such as an authorized commander to choose access policies on attributes and to encrypt confidential data under that access structure by encrypting with the corresponding public keys or attributes. Many related studies suggested key revocation mechanisms in CP-ABE and KP-ABE schemes in DTNs, respectively. Those all solutions are to append to each attribute an expiration timestamp and distribute a fresh set of keys to all valid users after the expiration. The timestamp based revocable Attribute Based Encryption schemes suffer from two main problems. The
Open Document