Skip to main content

Application of Blowfish Algorithm for Secure Transactions in Decentralized Disruption-Tolerant Networks

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 828))

  • 1121 Accesses

Abstract

Disruption-tolerant network (DTN) is the network which tends to lose the connection frequently due to many reasons like environmental issues, software/hardware faults. If the DTN system is not applied with any powerful cryptography, then data can be lost and safety of such device can be wondered. The protection of data is very much essential in the fields like military areas and also in rural areas where poor network connectivity is a consistent issue. The existing system for data transferring and retrieving securely, such as ciphertext-policy attribute-based encryption (CP-ABE), i.e., generating and distributing keys on the basis of attributes, has been successfully implemented. However, there can be chance of knowing the attributes such as name and its basic details about file. In the proposed paper, an effort has been made to provide security by using Blowfish algorithm, two-phase key, and two-phase commit protocol (2pc) for secure data transaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bai Q, Zheng Y (2011) Study on the access control model. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), vol 1

    Google Scholar 

  2. Chuah M, Yang P (2006) Node density-based adaptive routing scheme for disruption tolerant Networks. In: Proceedings of the IEEE MILCOM, pp 1–6

    Google Scholar 

  3. Hur J, Kang K (2014) Secure data retrieval for decentralized disruption-tolerant military networks. IEEE Trans Netw 22(1), ACM

    Google Scholar 

  4. Nie T, Song C, Zhi X (2010) Performance evaluation of DES and Blowfish algorithms. In: International conference in biomedical engineering and computer science (ICBECS)

    Google Scholar 

  5. Schneier B (1994) The blowfish encryption algorithm. Dr. Dobb’s J 19(4):38–40

    Google Scholar 

  6. Tian F, Liu B, Xiong J, Gui L (2015) Efficient caching scheme for data access in disruption tolerant networks. In: Broadband multimedia systems and broadcasting (BMSB), 2015 IEEE International Symposium

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Smita Mahajan or Dipti Kapoor Sarmah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahajan, S., Sarmah, D.K. (2019). Application of Blowfish Algorithm for Secure Transactions in Decentralized Disruption-Tolerant Networks. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1610-4_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1609-8

  • Online ISBN: 978-981-13-1610-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics