中断容忍网络技术的军事网络

K. Srikanth
{"title":"中断容忍网络技术的军事网络","authors":"K. Srikanth","doi":"10.7753/ijcatr0405.1007","DOIUrl":null,"url":null,"abstract":"Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some purpose (for ex-ample, moving their region), or some personal keys could be compromised, key revocation (or update) for every attribute is in any single user in an attribute cluster would have an effect on the opposite users within the cluster. For ex-ample, if a user joins or leaves associate and decentralized to all or any the opposite members within the same cluster for backward or rekeying procedure, or security degradation as a result of the windows of vulnerability if the previous attribute key's not","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Military Networks by Disruption Tolerant Network Technology\",\"authors\":\"K. Srikanth\",\"doi\":\"10.7753/ijcatr0405.1007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some purpose (for ex-ample, moving their region), or some personal keys could be compromised, key revocation (or update) for every attribute is in any single user in an attribute cluster would have an effect on the opposite users within the cluster. For ex-ample, if a user joins or leaves associate and decentralized to all or any the opposite members within the same cluster for backward or rekeying procedure, or security degradation as a result of the windows of vulnerability if the previous attribute key's not\",\"PeriodicalId\":104117,\"journal\":{\"name\":\"International Journal of Computer Applications Technology and Research\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Applications Technology and Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7753/ijcatr0405.1007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Applications Technology and Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7753/ijcatr0405.1007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

战场或敌对地区等军事环境中的移动节点似乎受到间歇性网络特性和频繁分区的影响。干扰容忍网络(DTN)技术已经成为杰出的解决方案,它使士兵携带的无线设备能够相互通信,并通过利用二级存储节点忠实地访问指导或命令。在这种情况下,一些最重要的难题是授权策略的社会控制和安全信息检索的策略更新。基于密文策略属性的秘密写入(CP-ABE)是解决访问管理问题的一种有前途的密码学解决方案。然而,在郊区DTNs中应用CP-ABE的问题引入了许多安全和隐私方面的挑战,这些挑战来自完全不同的权威机构。在本文中,我们倾向于提出安全信息检索主题受害CP-ABE,用于城郊ddn,其中多个密钥机构分别管理其属性。我们倾向于展示一种应用预期机制的方法,并有效地管理在可容忍干扰的军事网络中分发的机密信息。关键词:ddn容忍中断网络,cp - cipher文本-策略属性加密,ibe_identity加密,PC-Protocol -Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets, DBDHDecision双线性Diffie Hellman假设,KGC-Key generation Center国际计算机应用技术与研究第4卷-第5期,368 373,2015,ISSN: 2319-8656 www.ijcat.com 369 1 .引言在一些军事网络中,部队因堵塞而短暂断开,环境。容错网络(DTN)技术已经成为成功的解决方案,使节点能够在这些极端网络访问服务中相互交谈,指定的知识访问策略概述了由容错军事网络管理的用户属性或角色,指挥官可能会在1“联合国机构正在参与”区域2中存储咨询。“在这种情况下,假设多个关键机构可以管理其部署区域或梯队中的士兵自己的动态属性,这是一个廉价的假设,(ABE)[11] -[14]可能是一种有前途的方法,可以满足ddn中安全知识检索的需求。”ABE选择了一种机制,该机制允许对加密知识开发访问策略和个人密钥和密文之间的属性进行副学士学位访问管理。特别是,密文策略ABE (cabe)提供了一种可扩展的加密知识方法,指定加密方定义解密方必须拥有的属性集,以便解密密文[13]。但是,将ABE应用于ddn会在某些目的(例如,移动它们的区域)上引入许多与它们相关的属性的安全性,或者可能危及某些个人密钥,属性集群中任何单个用户的每个属性的密钥撤销(或更新)将对集群中的相反用户产生影响。例如,如果用户加入或离开关联和分散到同一集群内的所有或任何相反的成员以进行向后或重新密钥验证过程,或者如果先前的属性密钥不存在,则由于漏洞窗口而导致安全性降低
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Military Networks by Disruption Tolerant Network Technology
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some purpose (for ex-ample, moving their region), or some personal keys could be compromised, key revocation (or update) for every attribute is in any single user in an attribute cluster would have an effect on the opposite users within the cluster. For ex-ample, if a user joins or leaves associate and decentralized to all or any the opposite members within the same cluster for backward or rekeying procedure, or security degradation as a result of the windows of vulnerability if the previous attribute key's not
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance and Failure Evaluation of Orifice Plate in Natural Gas Pipeline using Computer Aided Engineering (CAE) Interoperability Framework for Electronic Health Records (EHR) Systems for the Tanzanian Government Hospitals in Iringa Implementation of Predictive Learning using Convolutional Neural Networks and Matlab in Cholera Outbreaks The Performance of Convolutional Neural Network Architecture in Classification Advancing Tuberculosis Prediction: Integrating AI, CNN, and MATLAB for Enhanced Predictive Modelling
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1