Abstract
Disruption-tolerant network (DTN) is the network which tends to lose the connection frequently due to many reasons like environmental issues, software/hardware faults. If the DTN system is not applied with any powerful cryptography, then data can be lost and safety of such device can be wondered. The protection of data is very much essential in the fields like military areas and also in rural areas where poor network connectivity is a consistent issue. The existing system for data transferring and retrieving securely, such as ciphertext-policy attribute-based encryption (CP-ABE), i.e., generating and distributing keys on the basis of attributes, has been successfully implemented. However, there can be chance of knowing the attributes such as name and its basic details about file. In the proposed paper, an effort has been made to provide security by using Blowfish algorithm, two-phase key, and two-phase commit protocol (2pc) for secure data transaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bai Q, Zheng Y (2011) Study on the access control model. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), vol 1
Chuah M, Yang P (2006) Node density-based adaptive routing scheme for disruption tolerant Networks. In: Proceedings of the IEEE MILCOM, pp 1–6
Hur J, Kang K (2014) Secure data retrieval for decentralized disruption-tolerant military networks. IEEE Trans Netw 22(1), ACM
Nie T, Song C, Zhi X (2010) Performance evaluation of DES and Blowfish algorithms. In: International conference in biomedical engineering and computer science (ICBECS)
Schneier B (1994) The blowfish encryption algorithm. Dr. Dobb’s J 19(4):38–40
Tian F, Liu B, Xiong J, Gui L (2015) Efficient caching scheme for data access in disruption tolerant networks. In: Broadband multimedia systems and broadcasting (BMSB), 2015 IEEE International Symposium
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mahajan, S., Sarmah, D.K. (2019). Application of Blowfish Algorithm for Secure Transactions in Decentralized Disruption-Tolerant Networks. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1610-4_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1609-8
Online ISBN: 978-981-13-1610-4
eBook Packages: EngineeringEngineering (R0)