Professional Documents
Culture Documents
DECENTRALIZED
DISRUPTION-TOLERANT
MILITARY NETWORKS
External Demonstration
1. Introduction
1.1 Introduction & Objective
1.2 Disruption Tolerant Networks (DTN)
1.3 Attribute Based Encryption (ABE)
1.2.1 KP-ABE
1.2.2 CP-ABE
Why ABE?
Eliminates dependency on a single user.
The message can be configured for future access,
ie; only after the user achieves the set of attributes.
Forward and Backward secrecy is maintained.
Threat of collusion can be overcome.
1.2.2 KP-ABE (1 of 2)
In KP-ABE, the sender only gets to label a ciphertext with a set of attributes.
The key authority chooses a policy for each user
that determines which cipher-texts he can decrypt
and issues the key to each user by embedding the
policy into the users key.
Hence the policy is contained in the Users key.
1.2.2 KP-ABE (2 of 2)
Key
(Using Policy)
Admin
(Key Authorities)
User
Sender
Uses Key
To decrypt
Uses Policy to
encrypt
Message
1.2.3 CP-ABE (1 of 2)
1.2.3 CP-ABE (2 of 2)
Key
(Using Attribute)
Admin
(Key Authorities)
User
Sender
Uses Key
To decrypt
Uses Attributes to
encrypt
Message
Example (Hospital)
Employee list
Access Chart
Sl. no
Role
Department
Doctor
Doctor
Ward Boy
Cleaner
Security
Doctor
Patient
OR
AND
Doctor
AND
A
Doctor
2.Literature survey
1.
2.
3.
4.
3. Implementation
3.1 Network Architecture
3.2 Elliptical Curve Cryptography
3.3 Algorithm
System
Descrip7on
Key
Authori7es:
They
are
key
genera7on
centre
that
generate
public/secret
parameters
for
CP-ABE.
Storage
node:
This
stores
data
from
senders
and
provide
corresponding
access
to
users.
It
may
be
mobile
or
sta7c.
Sender:
Sender
is
responsible
for
dening
access
policy
and
enforcing
it
on
its
data
by
encryp7ng
the
data
under
the
policy
before
storing
it
to
the
storage
node(e.g.,
a
commander).
User:
This
is
a
mobile
node
who
wants
to
access
the
data
stored
at
the
storage
node
(e.g.,
a
soldier).
3.3 Algorithm (1 of 3)
Key Generation
To generate public key
Q = d*P
Where,
n P
3.3 Algorithm (2 of 3)
For Encryption
Two cipher texts C1 and C2
C1 = k*P
C2 = M + k*Q
Where,
n k
: Random number
n M
: Plain Text
n P & Q : Public key
3.3 Algorithm (3 of 3)
For Decryption
To get back the message M
M = C2 - d*C1
Where,
n d
n M
: Private key
: Plain Text
6.Conclusion
6.1 Challenges in Implementation
6.2 Results
6.3 Future Enhancements
6.4 Other Applications
6.2 Results
CP-ABE imparts higher Data Confidentiality.
2pc Protocol eliminates the dependency on multiple
authorities to compose a master key.
Decentralization of Storage nodes give continuous
connectivity between all users.
If any storage node is under jamming then other
storage node will respond to Receiver and Sender
request/response related queries.
THANK YOU