期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2015
卷号:4
期号:10
页码:3973-3975
出版社:Shri Pannalal Research Institute of Technolgy
摘要:If such type of system would not have been existed, it would be very difficult to manage data security in decentralize disruption tolerant network (DTN) due its moveable or changeable node Policies. The existing systems or software in the market are Defense Message System Messaging, Directory Services, and Security Services, MaxProp: Routing for vehicle based disruption tolerant network & Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. One of the biggest disadvantage of these system are data can be easily get decrypted by any unauthorized person if he had both key and data so securing & managing data in DTN is difficult task. So this paper introduces proposed method that put an idea of setting up protocols for the receiver with its device unique number (MAC). And then the data will be sending to the storage node that can be movable in the network and once that node will deliver the data then the complete data will be securely transferred to the said device and with the help of Reverse circle cipher algorithm which is strongest encryption algorithm in networking domain will increase network security. So these methods will help to securely and effectively manage the confidential data in the disruption tolerant network.
关键词:Key Generation; Key Management; Reverse ; Circle Cipher