Trust establishment in ad hoc and sensor networks

被引:0
作者
Aivaloglou, Efthimia [1 ]
Gritzalis, Stefanos [1 ]
Skianis, Charalabos [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Informat & Commun Syst Secur Lab, Samos, Greece
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY | 2006年 / 4347卷
关键词
trust establishment; trust evaluation; ad hoc networks; sensor networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintaining and distributing trust within the network, and serve as the basis for higher level security services. This paper provides a state-of-the-art review of trust establishment frameworks for ad hoc and sensor networks. Certain types of frameworks are identified, such as behavior-based and certificate-based, according to their scope, purpose and admissible types of evidence. Moreover, hierarchical and distributed frameworks are discussed, based on the type of ad hoc and sensor networks they are designed for. The review is complemented by a comparative study built both on criteria specific to each category and on common criteria, grouped into three distinct classes: supported trust characteristics, complexity and requirements, and deployment complexity and flexibility.
引用
收藏
页码:179 / +
页数:3
相关论文
共 21 条
[1]  
[Anonymous], 2004, P 27 AUSTRALASIAN C
[2]   Revisiting public-key cryptography for wireless sensor networks [J].
Arazi, B ;
Elhanany, I ;
Arazi, O ;
Qi, HR .
COMPUTER, 2005, 38 (11) :103-105
[3]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[4]  
DAVIS CR, 2004, 3 INT C NETW ICN 04, P671
[5]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[6]  
ESCHENAUER L, 2002, SEC PROT WORKSH, P47
[7]  
GANERIWAL S, 2004, P 2 ACM WORKSH SEC A, P66
[8]   Why Trust is Bad for Security [J].
Gollmann, Dieter .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) :3-9
[9]  
Grandison T.W.A, 2003, Trust Management for Internet Applications
[10]  
Huang L, 2006, LECT NOTES COMPUT SC, V3842, P214