Volume 20 No 12 (2022)
Download PDF
Tnamosn: Trust-Based Neighbor Anonymity in Mobile Opportunistic Social Networks inWsn
Divya.N, R.Muralidharan
Abstract
Due to the energy constraint of sensor nodes, scalability and network longevity are critical issues for wireless sensor
networks (WSNs). Various authentication measures can be used to guarantee the transfer of data between nodes.
Authentication is an important protection measure in a sensor network. Making a wireless sensor network safe can
be difficult because of its dynamic characteristics. It will unite all networks and take advantage of their strengths to
overcome the challenge of user authentication in WSNs. We proposed Trust-Based Neighbor Anonymity in Mobile
Opportunistic Social Networks (TNAMOSN), an effective and reliable mechanism for sensor node authentication.
Neighbor change does not accept all valid IDs and correct IDs for node anonymity; two discovered identities must
provide all manner encryption for mutual identification. We are developing new ideas to allow our "white list" lists
to work more quickly and make encountering facts more efficient. The MAC mobility solution provides an
authentication sensor to be moved through networks to address the problems associated with authentication.
Encryption technologies are used to safeguard the data when moving it through a network. Trust security methods
are recommended for use in this document to authenticate a Trusted Certificate. A detailed study and several
experiments show the reliability and efficacy of Face Change's operation in Ns2 Simulator.
Keywords
WSN, MOSNs, Face Change, Trust, Node Anonymity
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.