alexa Abstract | Secure Group Communication to Prevent Unauthorized Messages in DTN Based Mobile Ad Hoc Networks
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


To establish a communication among wireless devices and to retrieve the data securely Disruption tolerant network (DTN) is introduced. For maintaining the data confidential many cryptographic solutions are used. The issues in accessing the information is solved by the algorithm called Ciphertext Policy-Attribute Based Encryption. This has enormous challenge in providing security for the information. In decentralized DTN, CP-ABE is implemented with multiple key authorities that handle the attributes individually. Two party computation protocols are introduced in CP-ABE to protect the authority’s interest in knowing the private keys created by others. The fine-drawn secret reversals are made for each and every feature set. Any monotone access structure can be used for creating the access policy in CP-ABE. In this the key authorities may be adjusted or not entirely believed. To maintain the trust partially the assumption is made such that the central authority does not conspiracy with local authority. To improve the trust we proposed an improved CP-ABE, in this we determine the trust of each user node in a network by estimating the trust of every node and updates the trust, so the user can have their trust in authority that generates the key for confidential data. By including the trust in CP-ABE, the users can trust the key authority for accessing the information securely. The privacy of the sending data and the data which are stored in storage node are maintained confidential by using the proposed system. Thus the proposed system has high degree of trust in the nodes.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): Rekha A, Anitha P, Selva Priya G, Gayathri R Krishna, Minojini N

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version