Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

The DTN technology is the famous technology which used in the military network it is differ from the normal peer to peer network it is having the storage network if the connection is not establish it will store in the storage node the after the connection is establish then it transfer to the receiver to make it secure ABE CP is used in which the transfer data is encrypted in which the key is required to decrypt, for that key manager is set up as it is a decentralized network multiple key authority are decentralized new bundle protocol is used for its efficiency and make it as traffic free session management is used in which we are having fast and secure data transfer.

Keywords: Attribute-based encryption ABE, disruption-tolerant network DTN, multi authority, secure data retrieval, Session management, Bundle protocol, Access control

Edition: Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Share this Article

How to Cite this Article?

A. Vineth, John Deva Prasanna, "Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152208, Volume 4 Issue 3, March 2015, 1221 - 1224

150 PDF Views | 116 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attribute-based encryption ABE'

Views: 141 , Downloads: 115 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Views: 134 , Downloads: 122 | CTR: 91 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 980 - 983

Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption

Vinod I. Jondhale, Manisha Y. Joshi

Share this Article

Views: 146 , Downloads: 128 | CTR: 88 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 107 - 109

High Secured Attribute Encryption Based System for Military Data Retrieval

Snehal Gaikwad, Suhas Patil

Share this Article

Views: 148 , Downloads: 136 | CTR: 92 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'disruption-tolerant network DTN'

Views: 141 , Downloads: 115 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Views: 146 , Downloads: 128 | CTR: 88 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 107 - 109

High Secured Attribute Encryption Based System for Military Data Retrieval

Snehal Gaikwad, Suhas Patil

Share this Article

Views: 148 , Downloads: 136 | CTR: 92 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'multi authority'

Views: 144 , Downloads: 110 | CTR: 76 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Views: 153 , Downloads: 128 | CTR: 84 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 96 - 98

DTN Technologies Used for Secure Data Retrieval in Decentralized Military Networks

Dr. B R Prasad Babu, Kavyashree.G, T. Gayathri

Share this Article

Views: 152 , Downloads: 129 | CTR: 85 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 87 - 90

Updating Policy with Access Control Using Multi Authority in the Cloud

V. Kalpana, J. Daphney Joann

Share this Article

Views: 148 , Downloads: 136 | CTR: 92 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 243 - 246

Survey Paper on Attribute Based Encryption in Disruption Tolerant Network

Vishwajeet Mete, Deepali Gothawal

Share this Article

Similar Articles with Keyword 'secure data retrieval'

Views: 142 , Downloads: 105 | CTR: 74 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Views: 137 , Downloads: 110 | CTR: 80 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Views: 141 , Downloads: 115 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Views: 153 , Downloads: 128 | CTR: 84 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 96 - 98

DTN Technologies Used for Secure Data Retrieval in Decentralized Military Networks

Dr. B R Prasad Babu, Kavyashree.G, T. Gayathri

Share this Article

Similar Articles with Keyword 'Session management'

Views: 118 , Downloads: 109 | CTR: 92 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Views: 128 , Downloads: 115 | CTR: 90 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1087 - 1090

A Secure Single Sign ? On Scheme for Distributed Systems and Network

Smitaprava Gachhayat, K. Ramana Reddy

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this Article

Views: 182 , Downloads: 150 | CTR: 82 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 3, March 2018

Pages: 651 - 658

Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems

Nareshkumar Harale, B. B. Meshram

Share this Article

Similar Articles with Keyword 'Access control'

Views: 79 , Downloads: 63 | CTR: 80 % | Weekly Popularity: ⮙8

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Views: 125 , Downloads: 99 | CTR: 79 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Views: 127 , Downloads: 101 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Views: 123 , Downloads: 102 | CTR: 83 %

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article
Top