High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Data Retrieval Using AES Approach For Decentralized Disruption-Tolerant Military Networks

Author(s):

Sandeep Khandelwal , AAEM?F COE, Koregaon bhima, Pune ; Sandeep Khandelwal, AAEM?F COE, Koregaon bhima, Pune ; Rajendra Tavhare, AAEM?F COE, Koregaon bhima, Pune ; Hidayad Sayyad, AAEM?F COE, Koregaon bhima, Pune ; Prof. Ganesh Kothawale, AAEM?F COE, Koregaon bhima, Pune

Keywords:

Disturbance Tolerant System (DTN), Secure Information Recovery, Access Control, Advance Encryption Standard (AES), Multi Specialist

Abstract

In this paper, by utilizing AES Algorithm for decentralized DTNs we portray how to secure data and recuperation arrange for where different key forces manage their properties self-sufficiently and avoid the key escrow, revocation, Coordination of characteristics issued from different forces. Adaptability is given by AES to encryption and decoding. For unravelling to happen the unscramble or needs a couple of attributes that matches or relates with the one portrayed by security game plan of the passageway control. We delineated that how securely and authority manage the private data by applying proposed part which is passed on in the aggravation tolerant military framework. The point of confinement of military security has stretched out from standard sorts of rivalry between nation states to fourth-time battling between a state and non-state on-screen characters. In Military Environment, they are endure spasmodic framework accessibility. So we are using the DTN (Disruption Tolerant Network) that allows the remote framework for military application to pass on each other moreover warriors can get to ordered data by utilizing stockpiling centre in cutting edge or counter zone to torment shape the widely appealing framework accessibility and achieve secure data or some summon by tried and true to research from external centre. The most troublesome thing in this cases are approval of affirmed game plans. Figure content approach property based encryption is a tried and true cryptographic response for get to control issues.

Other Details

Paper ID: IJSRDV5I30977
Published in: Volume : 5, Issue : 3
Publication Date: 01/06/2017
Page(s): 1348-1351

Article Preview

Download Article