Trust Establishment in Ad Hoc and Sensor Networks

  • Efthimia Aivaloglou
  • Stefanos Gritzalis
  • Charalabos Skianis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)


Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintaining and distributing trust within the network, and serve as the basis for higher level security services. This paper provides a state-of-the-art review of trust establishment frameworks for ad hoc and sensor networks. Certain types of frameworks are identified, such as behavior-based and certificate-based, according to their scope, purpose and admissible types of evidence. Moreover, hierarchical and distributed frameworks are discussed, based on the type of ad hoc and sensor networks they are designed for. The review is complemented by a comparative study built both on criteria specific to each category and on common criteria, grouped into three distinct classes: supported trust characteristics, complexity and requirements, and deployment complexity and flexibility.


Trust establishment trust evaluation ad hoc networks sensor networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN 2004), pp. 66–77. ACM Press, New York (2004)CrossRefGoogle Scholar
  2. 2.
    Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), pp. 65–71 (2005)Google Scholar
  3. 3.
    Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th conference on Australasian computer science (CRPIT 2004), pp. 47–54. Australian Computer Society, Inc. (2004)Google Scholar
  4. 4.
    Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems (2003)Google Scholar
  5. 5.
    Gollmann, D.: Why trust is bad for security. In: Electronic Notes in Theoretical Computer Science, vol. 157, pp. 3–9. Elsevier, Amsterdam (2006)Google Scholar
  6. 6.
    Grandison, T.: Trust management for internet applications. PhD thesis, Department of Computing, University of London (2003)Google Scholar
  7. 7.
    Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Workshop on Wireless Security, pp. 1–10 (2004)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D., Baras, J.S.: On trust establishment in mobile ad-hoc networks. In: Security Protocols Workshop, pp. 47–66 (2002)Google Scholar
  9. 9.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society, Los Alamitos (1996)Google Scholar
  10. 10.
    Shi, E., Perrig, A.: Designing secure sensor networks. Wireless Communication Magazine 11(6), 38–43 (2004)CrossRefGoogle Scholar
  11. 11.
    Verma, R.R.S., O’Mahony, D., Tewari, H.: Ntm - progressive trust negotiation in ad hoc networks. In: Proceedings of the 1st Joint IEI/IEE Symposium on Telecommunications Systems Research (2001)Google Scholar
  12. 12.
    Davis, C.R.: A localized trust management scheme for ad hoc networks. In: 3rd International Conference on Networking (ICN 2004), pp. 671–675 (2004)Google Scholar
  13. 13.
    Garfinkel, S.: PGP: Pretty Good Privacy. O Reilly & Associates, Sebastopol (1995)Google Scholar
  14. 14.
    Hubaux, J.P., Buttyán, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 146–155. ACM Press, New York (2001)CrossRefGoogle Scholar
  15. 15.
    Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad-hoc networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 341–354. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  17. 17.
    Yi, S., Kravets, R.: Moca: Mobile certificate authority for wireless ad hoc networks. In: Proceedings of 2nd Annual PKI Research Workshop (2003)Google Scholar
  18. 18.
    Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys & Tutorials 7(4), 2–28 (2005)CrossRefGoogle Scholar
  19. 19.
    Huang, L., Li, L., Tan, Q.: Behavior-based trust in wireless sensor network. In: APWeb Workshops, pp. 214–223. Springer, Berlin (2006)Google Scholar
  20. 20.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  21. 21.
    Arazi, B., Elhanany, I., Arazi, O., Qi, H.: Revisiting public-key cryptography for wireless sensor networks. IEEE Computer 38(11), 103–105 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Efthimia Aivaloglou
    • 1
  • Stefanos Gritzalis
    • 1
  • Charalabos Skianis
    • 1
  1. 1.Information and Communication Systems Security Laboratory, Department of Information and Communication Systems EngineeringUniversity of the AegeanSamosGreece

Personalised recommendations