Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hur, Junbeom | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.date.accessioned | 2021-06-23T00:05:13Z | - |
dc.date.available | 2021-06-23T00:05:13Z | - |
dc.date.issued | 2014-02 | - |
dc.identifier.issn | 1063-6692 | - |
dc.identifier.issn | 1558-2566 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/23765 | - |
dc.description.abstract | Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/TNET.2012.2210729 | - |
dc.identifier.scopusid | 2-s2.0-84894755237 | - |
dc.identifier.wosid | 000331966900002 | - |
dc.identifier.bibliographicCitation | IEEE-ACM TRANSACTIONS ON NETWORKING, v.22, no.1, pp 16 - 26 | - |
dc.citation.title | IEEE-ACM TRANSACTIONS ON NETWORKING | - |
dc.citation.volume | 22 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 16 | - |
dc.citation.endPage | 26 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | sci | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | KEY MANAGEMENT | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordAuthor | Access control | - |
dc.subject.keywordAuthor | attribute-based encryption (ABE) | - |
dc.subject.keywordAuthor | disruption-tolerant network (DTN) | - |
dc.subject.keywordAuthor | multiauthority | - |
dc.subject.keywordAuthor | secure data retrieval | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/6269094 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.