Skip to main content
Log in

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

  • Review Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes’ physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state-of-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Tsetsos V, Alyfantis G, Hasiotis T, Sekkas O, Hadjiefthymiades S. Towards commercial wireless sensor networks: business and technology architecture. Ad Hoc & Sensor Wireless Networks, 2006, 2(1): 59–80

    Google Scholar 

  2. Padmavathi G, Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1): 1–9

    Google Scholar 

  3. Jain A, Kant K, Tripathy M. Security solutions for wireless sensor networks. In: Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT). 2012, 430–433

    Google Scholar 

  4. Zhou Z, Yow K C. Geographic ad hoc routing security: attacks and countermeasures. Ad Hoc & Sensor Wireless Networks, 2005, 1(3): 235–253

    MATH  Google Scholar 

  5. Becher A, Benenson Z, Dornseif M. Tampering with motes: realworld physical attacks on wireless sensor networks. Technical Report. Springer Berlin Heidelberg, 2006

    Google Scholar 

  6. He D, Gao Y, Chan S, Chen C, Bu J. An enhanced Two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, 10(4): 361–371

    Google Scholar 

  7. Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M. Reputation and trust-based systems for ad hoc and sensor networks. In: Boukerche A, ed. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks. Ottawa: Wiley, 2008, 375–403

    Chapter  Google Scholar 

  8. Devisri S, Balasubramaniam C. Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific & Engineering Research, 2013, 4(2): 1–7

    Google Scholar 

  9. Babu S S, Raha A, Naskar M K. LSR protocol based on nodes potentiality in trust and residual energy for WSNs. International Journal of Network Security & Its Applications (IJNSA), 2012, 4(2): 21–34

    Article  Google Scholar 

  10. Yu Y, Li K, Zhou W, Li P. Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. Journal of Network and Computer Applications, 2012, 35(3): 867–880

    Article  Google Scholar 

  11. Cho J, Swami A, Chen I. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2011, 13(4): 562–583

    Article  Google Scholar 

  12. Zahariadis T, Trakadas P, Leligou H C, Maniatis S, Karkazis P. A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 2012, 69(2): 805–826

    Article  Google Scholar 

  13. Chen H, Wu H, Zhou X, Gao C. Reputation-based trust in wireless sensor networks. In: Proceedings of the IEEE International Conference on Multimedia and Ubiquitous Engineering, MUE’07. 2007, 603–607

    Google Scholar 

  14. Momani M. Trust models in wireless sensor networks: a survey. In: Proceedings of the Recent Trends in Network Security and Applications. Springer Berlin Heidelberg. 2010, 37–46

    Chapter  Google Scholar 

  15. Song F, Zhao B. Trust-based LEACH protocol for wireless sensor networks. In: Proceedings of the 2nd IEEE International Conference on Future Generation Communication and Networking (FGCN). 2008, 202–207

    Google Scholar 

  16. Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Computer Communications, 2010, 33(9): 1086–1093

    Article  Google Scholar 

  17. Al-Karaki J N, Kamal A E. Stimulating node cooperation in mobile ad hoc networks. Wireless Personal Communications, 2007, 44(2): 219–239

    Article  Google Scholar 

  18. Manikandan S P, Manimegalai R. Trust based routing to mitigate black hole attack in MANET. Life Science Journal, 2013, 10(4): 490–498

    Google Scholar 

  19. Pirzada A A, Mcdonald C. Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 2006, 37(1–2): 139–168

    Article  Google Scholar 

  20. Jain Y K, Sharma P. Trust based ad hoc on-demand distance vector for MANET. In: Proceedings of the National Conference on Security Issues in Network Technologies (NCSI-2012). 2012, 1–11

    Google Scholar 

  21. Bulut E, Szymanski B K. Secure multi-copy routing in compromised delay tolerant networks. Wireless Personal Communications, 2012, 73(1): 149–168

    Article  Google Scholar 

  22. Chang M, Chen I-R, Bao F, Cho J-H. On integrated social and QoS trust-based routing in delay tolerant networks. Wireless Personal Communications, 2012, 66(2): 443–459

    Article  Google Scholar 

  23. Chen I-R, Bao F, Chang M, Cho J-H. Trust management for encounterbased routing in delay tolerant networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2010, 1–6

    Google Scholar 

  24. Zhang J. A survey on trust management for VANETs. In: Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA). 2011, 105–112

    Chapter  Google Scholar 

  25. Sun Y, Luo H, Das S K. A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6): 785–797

    Article  Google Scholar 

  26. Govindan K, Mohapatra P. Trust computations and trust dynamics in mobile Adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 2012, 14(2): 279–298

    Article  Google Scholar 

  27. El-hajj W, Safa H, Guizani M. Survey of security issues in cognitive radio networks. Journal of Internet Technology, 2011, 12(2): 181–198

    Google Scholar 

  28. Yu B H, Shen Z, Miao C, Leung C, Niyato D. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 2010, 98(10): 1755–1772

    Article  Google Scholar 

  29. Momani M, Challa S. Survey of trust models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010, 1(3): 1–19

    Article  Google Scholar 

  30. Cho J-H, Swami A, Chen I R. A survey on trust management for mobile ad hoc networks. International Journal of Network Security and Its Applications (IJNSA), 2010, 13(4): 562–583

    Google Scholar 

  31. Srinivasan A, Wu J. A survey on secure localization in wireless sensor networks. In: Furth, ed. Encyclopedia of wireless and mobile communications. B(Ed). Florida, USA: CRC Press, Taylor and Francis Group, 2007

    Google Scholar 

  32. Fernandez-Gago M C, Roman R, Lopez J. A survey on the applicability of trust management systems for wireless sensor networks. In: Proceedings of the 3rd IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU). 2007, 25–30

    Chapter  Google Scholar 

  33. Brandao P, Sargento S, Crisostomo S, Prior R. Secure routing in ad hoc networks. Ad Hoc & Sensor Wireless Networks, 2005, 1(4): 277–300

    Google Scholar 

  34. Khalid O, Khan S U, Madani S A, Hayat K, Khan M I, Min-Allah N, Kolodziej J, Wang L Z, Zeadally S, Chen D. Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 2013, 6(6): 669–688

    Article  Google Scholar 

  35. Maheshwari R, Gao J, Das S R. Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM). 2007, 107–115

    Google Scholar 

  36. Bhosle A A, Thosar T P, Mehatre S. Black-hole and wormhole attack in routing protocol AODV in MANET. International Journal of Computer Science, Engineering and Applications (IJCSEA), 2012, 2(1): 45–54

    Article  Google Scholar 

  37. Dong D, Li M, Liu Y, Li X Y, Liao X. Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking, 2011, 19(6): 1787–1796

    Article  Google Scholar 

  38. Moya JM, Vallejo J C, Fraga D, Araujo A, Villanueva D, de Goyeneche J-M. Using reputation systems and non-deterministic routing to secure wireless sensor networks. Sensors, 2009, 9(5): 3958–3980

    Article  Google Scholar 

  39. Zada Khan W, Xiang Y, Y Aalsalem M, Arshad Q. The selective forwarding attack in sensor networks: detections and countermeasures. International Journal of Wireless and Microwave Technologies (IJWMT), 2012, 2(2): 33–44

    Article  Google Scholar 

  40. Arya M, Jain Y K. Grayhole attack and prevention in mobile ad hoc network. International Journal of Computer Applications, 2011, 27(10): 21–26

    Article  Google Scholar 

  41. Kaur J, Kumar V. An effectual defense method against gray hole attack in wireless sensor networks. International Journal of Computer Science and Information Technologies, 2012, 3(3): 4523–4528

    Google Scholar 

  42. Mohanapriya M, Krishnamurthi I. A light-weight and scalable solution for secure routing in DSR MANET for black hole attack. Ad Hoc & Sensor Wireless Networks, 2013, 17(1–2): 33–52

    Google Scholar 

  43. Yang B, Yamamoto R, Tanaka Y. Historical evidence based trust management strategy against black hole attacks in MANET. In: Proceedings of the 14th IEEE International Conference on Advanced Communication Technology (ICACT). 2012, 394–399

    Google Scholar 

  44. Ahmed A, Bakar K A, Channa M I. Performance analysis of adhoc on demand distance vector protocol. Journal of Computer Science, 2014, 10(9): 1466–1472

    Article  Google Scholar 

  45. Shoja M R K, Taheri H, Vakilinia S. A new approach to prevent black hole attack in AODV. International Journal of Computer Science and Information Security (IJCSIS), 2011, 9(1): 24–29

    Google Scholar 

  46. Ameza F, Assam N, Beghdad R. Defending AODV routing protocol against the black hole attack. International Journal of Computer Science and Information Security, 2010, 8(2): 112–117

    Google Scholar 

  47. Zhan G, Shi W, Deng J. Design and implementation of TARF: a trustaware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 2012, 9(2): 184–197

    Article  Google Scholar 

  48. Tanuja R, Rekha M K, Manjula S H, Venugopal K R, Iyengar S, Patnaik L M. Elimination of black hole and false data injection attacks in wireless sensor networks. In: Proceedings of the 3rd International Conference on Trends in Information, Telecommunication and Computing. 2013, 475–482

    Chapter  Google Scholar 

  49. Chen H, Wu H, Zhou X, Gao C. Agent-based trust model in wireless sensor networks. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD). 2007, 119–124

    Google Scholar 

  50. Bankovic Z, Vallejo J C, Fraga D, Moya J M. Detecting bad-mouthing attacks on reputation systems using self-organizing maps. In: Proceedings of the Computational Intelligence in Security for Information Systems. 2011, 9–16

    Chapter  Google Scholar 

  51. Dehnie S, Tomasin S. Detection of selfish nodes in networks using CoopMAC protocol with ARQ. IEEE Transactions on Wireless Communications, 2010, 9(7): 2328–2337

    Article  Google Scholar 

  52. Chen Z, Qiu Y, Liu J, Xu L. Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Computers & Mathematics with Applications, 2011, 62(9): 3378–3388

    Article  MATH  MathSciNet  Google Scholar 

  53. Hernandez-Orallo E, Serrat M D, Cano J, Calafate C T, Manzoni P. Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 2012, 16(5): 642–645

    Article  Google Scholar 

  54. Sun Y L, Han Z, Yu W, Liu K J R. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: Proceedings of the 25th IEEE International Conference on Computer Communications. 2006, 1–13

    Google Scholar 

  55. Gonzalez J M, Anwar M, Joshi J B D. Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, 556–563

    Google Scholar 

  56. Buchegger S, Le Boudec J-Y. Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic Ad-hoc networks). In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing. 2002, 226–236

    Chapter  Google Scholar 

  57. Chakrabarti A, Parekh V, Ruia A. A trust based routing scheme for wireless sensor networks. In: Proceedings of the Advances in Computer Science and Information Technology, Networks and Communications. 2012, 159–169

    Chapter  Google Scholar 

  58. Stelios Y, Papayanoulas N, Trakadas P, Maniatis S, Leligou H C, Zahariadis T. A distributed energy-aware trust management system for secure routing in wireless sensor networks. In: Proceedings of the Mobile Lightweight Wireless Systems. 2009, 85–92

    Chapter  Google Scholar 

  59. He Q, Wu D, Khosla P. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of the Wireless Communications and Networking Conference (WCNC). 2004, 825–830

    Google Scholar 

  60. Reddy Y B, Selmic R R. A trust-based approach for secure packet transfer in wireless sensor networks. International Journal on Advances in Security, 2011, 4(3): 198–207

    Google Scholar 

  61. Almenarez F, Marin A, Diaz D, Sanchez J. Developing amodel for trust management in pervasive devices. In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. 2006, 267–271

    Google Scholar 

  62. Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the Advanced Communications and Multimedia Security. 2002, 107–121

    Chapter  Google Scholar 

  63. Channa M I, Ahmed K M. A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 2011, 6(7): 549–557

    Article  Google Scholar 

  64. Gidijala N S, Datla S, Joshi R C. A robust trust mechanism algorithm for secure power aware AODV routing in mobile Ad hoc networks. In: Proceedings of the Contemporary Computing. 2010, 32–41

    Chapter  Google Scholar 

  65. Chen H. Task-based trust management for wireless sensor networks. International Journal of Security and Its Applications, 2009, 3(2): 21–26

    MATH  Google Scholar 

  66. Liu S, Pang L, Pei Q, Ma H, Peng Q. Distributed event-triggered trust management for wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Information Assurance and Security. 2009, 291–294

    Google Scholar 

  67. Yadav K, Srinivasan A. iTrust: an integrated trust framework for wireless sensor networks. In: Proceedings of the 2010 ACM Symposium on Applied Computing. 2010, 1466–1471

    Chapter  Google Scholar 

  68. Srinivasan A, Teitelbaum J, Wu J. DRBTS: distributed reputationbased beacon trust system. In: Proceddings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. 2006, 277–283

    Google Scholar 

  69. Qin T, Yu H, Leung C, Shen Z, Miao C. Towards a trust aware cognitive radio architecture. ACM SIGMOBILE Mobile Computing and Communications Review, 2009, 13(2): 86–95

    Article  Google Scholar 

  70. Ganeriwal S, Balzano L K, Srivastava M B. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks, 2008, 4(3): 1–37

    Article  Google Scholar 

  71. Bansal S, Baker M. Observation-based cooperation enforcement in ad hoc networks. In: Proceedings of the Computing Research Repository (CoRR). 2003, 1–10

    Google Scholar 

  72. Crosby G V, Pissinou N, Gadze J. A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS). 2006, 13–22

    Chapter  Google Scholar 

  73. Buchegger S, Le Boudec J-Y. A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of 3rd Workshop on Economics of Peer-to-Peer Systems (P2PEcon). 2004, 1–6

    Google Scholar 

  74. Sun Y L, Yu W, Han Z, Liu K J R. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305–317

    Article  MATH  Google Scholar 

  75. Ren K, Li T, Wan Z, Bao F, Deng R H, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks, 2004, 45(6): 687–699

    Article  MATH  Google Scholar 

  76. Zouridaki C, Mark B L, Hejmo M, Thomas R K. A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2005, 1–10

    Chapter  Google Scholar 

  77. Reddy Y B, Srivathsan S. Game theory model for selective forward attacks in wireless sensor networks. In: Proceedings of the 17th IEEE Conference of Control and Automation. 2009, 458–463

    Google Scholar 

  78. Lin C, Wu G, Li M, Chen X, Liu Z, Yao L. A selfish node preventive real time fault tolerant routing protocol for WSNs. In: Proceeding of the 4th International Conference on Internet of Things, Cyber, Physical and Social Computing (iThings/CPSCom). 2011, 330–337

    Google Scholar 

  79. Shila D M, Anjali T. A game theoretic approach to gray hole attacks in wireless mesh networks. In: Proceedings of the IEEE Conference on Military Communications (MILCOM). 2008, 1–7

    Google Scholar 

  80. Xiong L, Liu L. A reputation-based trust model for peer-to-peer eCommerce communities. In: Proceedings of the IEEE International Conference on E-Commerce. 2003, 275–284

    Google Scholar 

  81. Gupta B, Mahavidhyalaya K, Kaur H, Bedi P. Predicting grid user trustworthiness using neural networks. In: Proceedings of the IEEE World Congress on Information and Communication Technologies (WICT). 2011, 727–732

    Google Scholar 

  82. Zong B, Xu F, Jiao J, Lv J. A broker-assisting trust and reputation system based on artificial neural network. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 2009, 4710–4715

    Google Scholar 

  83. Baohua H, Heping H, Zhengding L. Identifying local trust value with neural network in P2P environment. In: Proceedings of the 1st IEEE and IFIP International Conference in Central Asia on Internet. 2005, 5–9

    Google Scholar 

  84. Sang J, Qi Z. Research on reputation estimation system of e-commerce based on fuzzy neural network. In: Proceedings of the IEEE Control and Decision Conference (CCDC). 2010, 1866–1869

    Google Scholar 

  85. Elizabeth B L, Aaishwarya R, Kiruthika P, Shrada M N, Prakash A. J, Uthariaraj V R. Bayesian based confidence model for trust inference in MANETs. In: Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT). 2011, 402–406

    Google Scholar 

  86. Begriche Y, Labiod H. A bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol. In: Proceedings of the 7th IEEE International Conference on Information, Communications and Signal Processing (ICICS). 2009, 1–8

    Google Scholar 

  87. Beghriche Y, Toubiana V, Labiod H. A Bayesian filter to detect misbehaving nodes in MANETs. In: Proceedings of the New Technologies, Mobility and Security (NTMS). 2008, 1–5

    Google Scholar 

  88. Momani M, Challa S, Alhmouz R. BNWSN: Bayesian network trust model for wireless sensor networks. In: Proceedings of the IEEE Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA). 2008, 110–115

    Google Scholar 

  89. Momani M, Aboura K, Challa S. RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Intelligent Sensors, Sensor Networks and Information. 2007, 347–352

    Google Scholar 

  90. Quercia D, Hailes S, Capra L. B-trust: Bayesian trust framework for pervasive computing. Trust management. Springer Berlin Heidelberg. 2006, 298–312

    Google Scholar 

  91. Dai H J, Jia Z P, Dong X N. An entropy-based trust modeling and evaluation for wireless sensor networks. In: Proceedings of the IEEE International Conference on Embedded Software and Systems (ICESS). 2008, 27–34

    Google Scholar 

  92. Marti S, Giuli T J, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th ACM Annual In ternational Conference on Mobile Computing and Networking. 2000, 255–265

    Google Scholar 

  93. Shafer G. A mathematical theory of evidence. Princeton: Princeton University Press, 1976

    MATH  Google Scholar 

  94. Jøsang A. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279–311

    Article  MathSciNet  Google Scholar 

  95. Josang A, Ismail R. The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, 2002

    Google Scholar 

  96. Zahariadis T, Leligou H, Karkazis P, Trakadas P, Papaefstathiou I, Vangelatos C, Besson L. Design and implementation of a trust-aware routing protocol for largeWSNs. International Journal of Network Security & Its Applications, 2010, 2(3): 52–68

    Article  Google Scholar 

  97. Karp B, Kung H. GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking. 2000, 243–254

    Google Scholar 

  98. Johnson D B, Maltz D A, Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Networking, 2001, 5: 139–172

    Google Scholar 

  99. Royer E M, Perkins C E. An implementation study of the AODV routing protocol. In: Proceedings of the IEEE Wireless Communications and Networking Confernce (WCNC). 2000, 1003–1008

    Google Scholar 

  100. Gnawali O, Fonseca R, Jamieson K, Moss D, Levis P. Collection tree protocol. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems — SenSys. 2009, 1–14

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Ahmed.

Additional information

Adnan Ahmed is currently registered as a PhD student in the Department of Computer Science at Universiti Teknologi Malaysia, Malaysia. He completed his MS of Engineering in Computer Systems Engineering in 2012 from Quaid-e-Awam University of Engineering, Science and Technology, Pakistan. He is employed as an assistant professor in the same university in the Department of Computer Systems. His research interest includes routing in ad hoc networks, security and trust management in ad hoc networks.

Dr. Kamalrulnizam Abu Bakar is an associate professor in Computer Science at Universiti Teknologi Malaysia (UTM), Malaysia and member of the “Pervasive Computing” research group. He completed his PhD in computer science from Aston University, UK. He is professional member of IEEE and ACM. He involves in several research projects and is the referee for many scientific journals and conferences. His specialization includes mobile and wireless computing, information security and grid computing.

Professor Dr. Muhammad Ibrahim Channa is a professor in the Department of Information Technology, Quaid-e-Awam University of Engineering Science and Technology, Pakistan. He completed his PhD from Asian Institute of Technology (AIT), Thailand. He completed MSc in Computer Science from University of Sind, Pakistan, in 1995 and MS in Information Technology from National University of Science and Technology, Pakistan in 2005. His research interest comprises of trust management, security, routing, and quality of service in mobile ad hoc networks.

Khalid Haseeb received his MSc and MS degree from University of Peshawar, Pakistan. He is pursuing PhD in computer science from Universiti Teknologi Malaysia. He is a research student in “Pervasive Computing Research Group” and his research area is wireless sensor networks.

Abdul Waheed Khan graduated from Department of Computer Science, University of Peshawar, Pakistan in 2005. He has got his MSc in Digital Communications Networks with Distinction from London Metropolitan University, UK in 2008. Currently, he is pursuing his PhD at Faculty of Computing, Universiti Teknologi Malaysia. From 2009 to 2012, he worked as a lecturer at Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Saudi Arabia. His research areas include wireless sensor networks, ad hoc networks, and next generation networks.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, A., Abu Bakar, K., Channa, M.I. et al. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front. Comput. Sci. 9, 280–296 (2015). https://doi.org/10.1007/s11704-014-4212-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-014-4212-5

Keywords

Navigation