One of the protected communication techniques in cluster based privacy preserving network is condition that a Trusted Key Management Protocol (TKMP). TKMP calculates a confidential input exchanging pro each and every one the cluster nodes in the communique for security. TKMP allocates a dynamic private and public key exchanging significance for dependence variable where it will be tartan for the period of transportation. The total proposed protocol is executed in three stages, for example, Initial-sending, key creation and validation of key and affirmation. During primary stage, the cluster vertex accessible as unique individuality (ID), and after that, the following stage utilizes the Paillier cryptosystem (PC) homomorphic encryption model, for making the basic key to the message correspondence. At last, geometrical representation is through various variables, for example, a hashing capacity, homomorphism encryption, profile succession, irregular number capacities. The proposed TKMP strategy sets up the verified correspondence over the WSN by the authentication process.
Volume 12 | 03-Special Issue
Pages: 1013-1019
DOI: 10.5373/JARDCS/V12SP3/20201346