Open Access Open Access  Restricted Access Subscription Access

Network Security for Emerging Application Using Disruption Tolerant Sensor Network (DTSN)


Affiliations
1 Bharathiar University, Coimbatore, Tamilnadu, India
2 Computer Science Dept, Oxbridge College of Science and Commerce, Bengalure, India
 

In traditional networks, Intruder nodes within Disruption-tolerant sensor network( DTSN) may try to attempt data destruction in transmission of the data to its destination. (DTSN) technologies are becoming successful solutions that allow wireless devices to communicate with each other and access the confidential information reliably by exploiting external storage nodes by using a prims routing algorithm to find shortest path from source and destination. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data communication. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE DTSN introduces several security and privacy challenges with regard to the attribute revocation, key implementation, and coordination of attributes issued from different authorities. Here the proposed secure data communication using CP-ABE for DTSN where key authorities manage their attributes independently and also demonstrate to apply the proposed mechanism to secure and efficiently manage the confidential data distributed in the disruption-tolerant sensor network for energy efficiency.

Keywords

DTSN, Security, Encryption, Routing.
User
Notifications
Font Size

  • N.Bhutta,G.Ansa, E. Johnson, N.Bhutta,G.Ansa, E.Johnson Security analysis for Delay/Disruption Tolerant sensor network ”,International jornal of research and technology2009
  • J.Iswariya, Mr.J.Lourdu Xavie “A Secure Communication Model to Detect Flooding Attacks in Disruption Tolerant Networks”,International journal of engineering and computer science jan 2014
  • D.S.Delphin Hepsiba, S.Simla Mercy, S.Prabu, “Secured Data Forwarding Technique in Disruption Tolerant NetworksSurvey” International Journal of Advanced Research in Computer and Communication Engineering Feb 2014.
  • Jingzhe Du, Evangelos Kranakis, “Distributed Key Establishment in Disruption Tolerant Location Based Social Wireless Sensor and Actor Network”, International journal of engineering 2013
  • S.Shanmugasundaram and S.Chitra, “Privacy Preserving and Secure Data Retrieval in Sensor Network using Homomorphic Encryption Algorithm”, International Journal of Emerging Technology in Computer Science & Electronics 2015
  • Peng Yang, Mooi Choo Chuah, “Context-Aware Multicast Routing Scheme for Disruption Tolerant Networks”,IEEE 2013
  • N. Asokan, Kari Kostiainen, Philip Ginzboorg, J¨org Ott2, Cheng Luo2, “Towards Securing Disruption-Tolerant Networking”, research center NRC-TR-2007-007, 2007.
  • Cheng-Lung Yang, WernhuarTarng, Kuen-Rong Hsieh and Mingteh Chen National Hsinchu University of Education, Hsinchu, Taiwan Ralink Technologies, Hsinchu, Taiwan Micrel Semiconductor Inc., San Jose, California, U.S.AA Security Mechanism for Clustered Wireless Sensor Networks Based on Elliptic Curve Cryptography IEEE 2010.
  • XiaowangGuo ,Jianyong Zhu Research on Security Issues in Wireless Sensor Networks International Conference on Electronic & Mechanical Engineering and Information Technology IEEE 2011
  • Abhishek Jain, Kamal Kant M. R. TripathySecurity Solutions for Disruption Tolerant Networks Department of Computer Science & Engineering ASET, Amity University Noida, India IEEE 2012.
  • T.Thenmozhi, Dr.R.M. Soma sundaram Dean Towards an approach for improved security in Wireless Sensor Networks Department of Sciences SNS College of Engineering Coimbatore, India IEEE 2012
  • Bin Tian, Yang Xin Shoushan LU0, Xi ouYang Dong , Li Zhe Gong , Yixian Yang A NOVEL KEY MANAGEMENT METHOD FOR WIRELESS SENSOR NETWORKS Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China IEEE 2010.

Abstract Views: 245

PDF Views: 99




  • Network Security for Emerging Application Using Disruption Tolerant Sensor Network (DTSN)

Abstract Views: 245  |  PDF Views: 99

Authors

V. Umesh
Bharathiar University, Coimbatore, Tamilnadu, India
N. D. Niveditha
Computer Science Dept, Oxbridge College of Science and Commerce, Bengalure, India

Abstract


In traditional networks, Intruder nodes within Disruption-tolerant sensor network( DTSN) may try to attempt data destruction in transmission of the data to its destination. (DTSN) technologies are becoming successful solutions that allow wireless devices to communicate with each other and access the confidential information reliably by exploiting external storage nodes by using a prims routing algorithm to find shortest path from source and destination. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data communication. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE DTSN introduces several security and privacy challenges with regard to the attribute revocation, key implementation, and coordination of attributes issued from different authorities. Here the proposed secure data communication using CP-ABE for DTSN where key authorities manage their attributes independently and also demonstrate to apply the proposed mechanism to secure and efficiently manage the confidential data distributed in the disruption-tolerant sensor network for energy efficiency.

Keywords


DTSN, Security, Encryption, Routing.

References





DOI: https://doi.org/10.21095/ajmr%2F2017%2Fv0%2Fi0%2F122460