Skip to main content

Trust Establishment in Ad Hoc and Sensor Networks

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintaining and distributing trust within the network, and serve as the basis for higher level security services. This paper provides a state-of-the-art review of trust establishment frameworks for ad hoc and sensor networks. Certain types of frameworks are identified, such as behavior-based and certificate-based, according to their scope, purpose and admissible types of evidence. Moreover, hierarchical and distributed frameworks are discussed, based on the type of ad hoc and sensor networks they are designed for. The review is complemented by a comparative study built both on criteria specific to each category and on common criteria, grouped into three distinct classes: supported trust characteristics, complexity and requirements, and deployment complexity and flexibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN 2004), pp. 66–77. ACM Press, New York (2004)

    Chapter  Google Scholar 

  2. Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), pp. 65–71 (2005)

    Google Scholar 

  3. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th conference on Australasian computer science (CRPIT 2004), pp. 47–54. Australian Computer Society, Inc. (2004)

    Google Scholar 

  4. Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems (2003)

    Google Scholar 

  5. Gollmann, D.: Why trust is bad for security. In: Electronic Notes in Theoretical Computer Science, vol. 157, pp. 3–9. Elsevier, Amsterdam (2006)

    Google Scholar 

  6. Grandison, T.: Trust management for internet applications. PhD thesis, Department of Computing, University of London (2003)

    Google Scholar 

  7. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Workshop on Wireless Security, pp. 1–10 (2004)

    Google Scholar 

  8. Eschenauer, L., Gligor, V.D., Baras, J.S.: On trust establishment in mobile ad-hoc networks. In: Security Protocols Workshop, pp. 47–66 (2002)

    Google Scholar 

  9. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society, Los Alamitos (1996)

    Google Scholar 

  10. Shi, E., Perrig, A.: Designing secure sensor networks. Wireless Communication Magazine 11(6), 38–43 (2004)

    Article  Google Scholar 

  11. Verma, R.R.S., O’Mahony, D., Tewari, H.: Ntm - progressive trust negotiation in ad hoc networks. In: Proceedings of the 1st Joint IEI/IEE Symposium on Telecommunications Systems Research (2001)

    Google Scholar 

  12. Davis, C.R.: A localized trust management scheme for ad hoc networks. In: 3rd International Conference on Networking (ICN 2004), pp. 671–675 (2004)

    Google Scholar 

  13. Garfinkel, S.: PGP: Pretty Good Privacy. O Reilly & Associates, Sebastopol (1995)

    Google Scholar 

  14. Hubaux, J.P., Buttyán, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 146–155. ACM Press, New York (2001)

    Chapter  Google Scholar 

  15. Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad-hoc networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 341–354. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  17. Yi, S., Kravets, R.: Moca: Mobile certificate authority for wireless ad hoc networks. In: Proceedings of 2nd Annual PKI Research Workshop (2003)

    Google Scholar 

  18. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys & Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  19. Huang, L., Li, L., Tan, Q.: Behavior-based trust in wireless sensor network. In: APWeb Workshops, pp. 214–223. Springer, Berlin (2006)

    Google Scholar 

  20. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  21. Arazi, B., Elhanany, I., Arazi, O., Qi, H.: Revisiting public-key cryptography for wireless sensor networks. IEEE Computer 38(11), 103–105 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aivaloglou, E., Gritzalis, S., Skianis, C. (2006). Trust Establishment in Ad Hoc and Sensor Networks. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_15

Download citation

  • DOI: https://doi.org/10.1007/11962977_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics