“…Our work differs from the above works in that we devise a trust metric considering multiple dimensions of a node's trust and leverage it for decision making in the process of key management and group communication in order to achieve system goals including high service availability, low communication cost, and low risk. Existing certificate-based public key management schemes cited above expose practical limitations, including needing a centralized trusted CA [25], high communication overhead or delay [15,21], and using static trust [20,24,22,23] to select CAs. In addition, hierarchy-based selection of CAs (e.g., group leaders or cluster heads) [16,17,18,19] can lead to high security vulnerability when the selected CAs are attacked and compromised.…”