Trust Management in Wireless Sensor Networks


To develop methods and techniques addressing different aspects of trust in WSNs and to assess the added value of these methods.


The contact for this research project is here.


Trustworthiness of systems based on Wireless Sensor Networks is an issue of growing importance as such systems are rapidly conquerring new application domains. This involves users' trust that systems will provide and maintain the required ans expected level of service quality (e.g. with respect to safety, security and/or privacy guarantees), but may also be considered at a more fine level, for instance concerning mutual trust of the nodes of the network and their ability to collectively flfill the system mission, even in the presence of mailcius attacks.


The approach taken in this research is as follows:

  • New methods of trust management are proposed taking different viewpoints of trustor and trustee.

  • The methods are analyzed applying various means, including formal specifications, simulators and laboratory experiments.

  • Demonstrators are developed to instantiate the methods in realistic conditions


  • The project started in 2006


  • A method of context-sensitive privacy management in WSNs was proposed and demonstrated with the frame of the EC funded 6th FR STREP project ANGEL.

  • A method of managing mutual trust of the nodes of WSN was proposed. A simulator has been developed to analyze the properties of this method.

  • Simulation experiments were carried out to ivestigate the performance of the proposed trust management method for networks of different size and with different patterns of faulty bahaviour.


  1. Górski J., Turower A., Wardzinski A., Distributed Trust Management Model for Wireless Sensor Networks, DepCoS 2011, in: Monographs of system dependability: Problems of dependability and modelling, Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław, 2011, pp. 83-94.
  2. Download PDF (431 kB)

  3. Górski J., Turower A., Using trust management model for detection of faulty nodes in Wireless Sensor Networks , ICT Young 2011, Zeszyty naukowe wydziału ETI PG, Gdańsk, 2011, pp. 471-476.
  4. Download PDF (431 kB)

  5. Turower A., Wardzinski A., Aktywna metoda testowania bezpieczeństwa aplikacji webowych httpvalider oraz ocena jej skuteczności , Proc. National Software Eng. Conference (KKIO 2010), PNT, Gdańsk, 2010, pp. 345-352.
  6. Download PDF (431 kB)

  7. Gołaszewski G., Górski J., Context Sensitive Privacy Management in a Distributed Environment , R. Meersman et al. (Eds.): OTM 2010, Part I, Springer LNCS 6426, pp. 639–655, 2010.
  8. Download PDF (431 kB)

  9. Górski J., Gołaszewski G., Miler J., Piechówka M., Baldus H., Trustworthiness: safety, security and privacy issues , Proc. 14th IEEE International Conference on Electronics, Circuits and Systems ICECS 2007, 2007, pp. 641-644
  10. Download PDF (431 kB)