The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


In traditional networks, Intruder nodes within Disruption-tolerant sensor network( DTSN) may try to attempt data destruction in transmission of the data to its destination. (DTSN) technologies are becoming successful solutions that allow wireless devices to communicate with each other and access the confidential information reliably by exploiting external storage nodes by using a prims routing algorithm to find shortest path from source and destination. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data communication. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE DTSN introduces several security and privacy challenges with regard to the attribute revocation, key implementation, and coordination of attributes issued from different authorities. Here the proposed secure data communication using CP-ABE for DTSN where key authorities manage their attributes independently and also demonstrate to apply the proposed mechanism to secure and efficiently manage the confidential data distributed in the disruption-tolerant sensor network for energy efficiency.

Keywords

DTSN, Security, Encryption, Routing.
User
Notifications
Font Size