2016
DOI: 10.24003/emitter.v4i1.116
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

Abstract: MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 9 publications
(24 reference statements)
0
9
0
Order By: Relevance
“…the only user in revocation list can't read the data because his transmission will be rejected by the system. There are many method to protect the data [3] [6], where they analyzed the secure data with encryption. Make a palintext become a ciphertext with Ciphertext Policy Attribute-Based Encryption (CP-ABE).…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…the only user in revocation list can't read the data because his transmission will be rejected by the system. There are many method to protect the data [3] [6], where they analyzed the secure data with encryption. Make a palintext become a ciphertext with Ciphertext Policy Attribute-Based Encryption (CP-ABE).…”
Section: Methodsmentioning
confidence: 99%
“…Wireless Sensor Networks (WSNs) have many applications in the internet of things era. One of them is an application for environment monitoring [2] [3][4] [5]. The environmental monitoring system uses WSN technology to obtain information such as carbon dioxide, carbon monoxide, temperature, humidity, luminosity, and noise.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations