Trust Without Identification

  • Howard Chivers
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)


This extended abstract describes an alternative to trusting individual nodes in pervasive systems, which is to exploit the diversity of nodes in such systems to build application ensembles that are collectively trustworthy. These configurations are resilient to high levels of attack, and are not dependent on large pre-distribution key-spaces.


Sensor Network Malicious Node Individual Node Reputation System Sybil Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004), pp. 259–268. ACM Press, Berkley California (2004)Google Scholar
  3. 3.
    Chivers, H., Clark, J.A.: Smart dust, friend or foe?-—Replacing identity with configuration trust. Computer Networks Special Issue: Military Communications Systems and Technologies 46(5), 723–740 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Howard Chivers
    • 1
  1. 1.Department of Information SystemsCranfield University, DCMT ShrivenhamSwindonUK

Personalised recommendations