Volume 20 No 12 (2022)
 Download PDF
Tnamosn: Trust-Based Neighbor Anonymity in Mobile Opportunistic Social Networks inWsn
Divya.N, R.Muralidharan
Due to the energy constraint of sensor nodes, scalability and network longevity are critical issues for wireless sensor networks (WSNs). Various authentication measures can be used to guarantee the transfer of data between nodes. Authentication is an important protection measure in a sensor network. Making a wireless sensor network safe can be difficult because of its dynamic characteristics. It will unite all networks and take advantage of their strengths to overcome the challenge of user authentication in WSNs. We proposed Trust-Based Neighbor Anonymity in Mobile Opportunistic Social Networks (TNAMOSN), an effective and reliable mechanism for sensor node authentication. Neighbor change does not accept all valid IDs and correct IDs for node anonymity; two discovered identities must provide all manner encryption for mutual identification. We are developing new ideas to allow our "white list" lists to work more quickly and make encountering facts more efficient. The MAC mobility solution provides an authentication sensor to be moved through networks to address the problems associated with authentication. Encryption technologies are used to safeguard the data when moving it through a network. Trust security methods are recommended for use in this document to authenticate a Trusted Certificate. A detailed study and several experiments show the reliability and efficacy of Face Change's operation in Ns2 Simulator.
WSN, MOSNs, Face Change, Trust, Node Anonymity
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.