High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Data Retrieval Using AES Approach for Decentralized Disruption-Tolerant Military Network

Author(s):

Rajendra Shantaram Tavhare , Al-Ameen Educational And Medical Foundation collage of engg. koregaon Bhima; Hidayat M. Sayyad, Al-Ameen Educational And Medical Foundation collage of engg. koregaon Bhima; Sandeep R. Khandelwal, Al-Ameen Educational And Medical Foundation collage of engg. koregaon Bhima; Prof. Ganesh S. Kothawale, Al-Ameen Educational And Medical Foundation collage of engg. koregaon Bhima

Keywords:

Access Control, Advance encryption Standard (AES), Disruption Tolerant Network (DTN), multi authority, secure data retrieval

Abstract

Military security infers the ability of a country state to protect itself, or dissuade military animosity. On the other hand, military security infers the ability of a country state to uphold its arrangement decisions by utilization of military power. The expression "military security" is viewed as synonymous with "security" in a lot of its utilization. One of the meanings of security given in the Dictionary of Military and Associated Terms, might be viewed as a meaning of "military security". The extent of military security has extended from customary types of contention between country states to fourth-era fighting between a state and non-state on-screen characters. In Military Environment, they are enduring discontinuous system availability. So we are utilizing the DTN (Disruption Tolerant Network) that permits the remote system for military application to convey each other furthermore warriors can get to classified information by using stockpiling hub in front line or antagonistic area to pain shape the middle of the road system availability and accomplish secure information or some summon by dependable to investigate from outer hub. The most difficult thing in this cases are authorization of approved arrangements. Cipher text-approach property based encryption is a dependable cryptographic answer for access control issues. In this paper, by using AES Algorithm for decentralized DTNs we characterize how to secure information and recovery plan where various key powers deal with their properties autonomously and dodge the key escrow, repudiation, Coordination of qualities issued from various powers. Versatility is given by AES to encryption and decryption. We depicted that how safely and proficiency deal with the private information by applying proposed component which is conveyed in the disturbance tolerant military system.

Other Details

Paper ID: IJSRDV4I80167
Published in: Volume : 4, Issue : 8
Publication Date: 01/11/2016
Page(s): 201-203

Article Preview

Download Article