Skip to main content
. 2020 Dec 14;6:e334. doi: 10.7717/peerj-cs.334

Table 7. The core approaches adapted by TM models.

Article Approach
Ahmad, Franqueira & Adnane (2018), Ahmed, Al-Rubeaai & Tepe (2017), Chen et al. (2010), Li et al. (2012), Mármol & Pérez (2012), Minhas et al. (2011), Monir, Abdel-Hamid & El Aziz (2013), Rostamzadeh et al. (2015), Sahoo et al. (2012), Soleymani et al. (2017), Wei, Yu & Boukerche (2014), Yang (2013)
  • Experience-based

Ahmad, Franqueira & Adnane (2018), Alagar & Wan (2015), Chen et al. (2010), Minhas et al. (2011), Monir, Abdel-Hamid & El Aziz (2013), Raya et al. (2008), Zhang, Chen & Cohen (2013)
  • Role-based

Abdelaziz, Lagraa & Lakas (2014), Ahmed, Al-Rubeaai & Tepe (2017), Haddadou, Rachedi & Ghamri-Doudane (2014), Li et al. (2013), Mármol & Pérez (2012), Monir, Abdel-Hamid & El Aziz (2013), Rostamzadeh et al. (2015), Sahoo et al. (2012), Sedjelmaci & Senouci (2015)
  • Neighbor opinion

Ahmed, Al-Rubeaai & Tepe (2017), Biswas, Sanzgiri & Upadhyaya (2016), Chen & Wei (2013), Gazdar, Belghith & Abutair (2018), Mármol & Pérez (2012), Wei, Yu & Boukerche (2014), Yang (2013)
  • Direct and indirect experience

Chen & Wei (2013), Gazdar et al. (2012), Rawat et al. (2015), Raya et al. (2008), Soleymani et al. (2017), Wahab, Otrok & Mourad (2014), Wei, Yu & Boukerche (2014)
  • Probability, Markov, Dempster-Shafer, Bayesian inference

Alagar & Wan (2015), Biswas, Misic & Misic (2011), Biswas, Sanzgiri & Upadhyaya (2016), Li et al. (2013), Wu, Ma & Zhang (2011)
  • RSU managed trust

Sahoo et al. (2012), Sedjelmaci & Senouci (2015), Wahab, Otrok & Mourad (2014)
  • Cluster-based

Rostamzadeh et al. (2015), Shaikh & Alzahrani (2014), Soleymani et al. (2017), Ya, Shihui & Bin (2015)
  • Location trust association

Mármol & Pérez (2012), Monir, Abdel-Hamid & El Aziz (2013), Zhang, Chen & Cohen (2013)
  • Trust evaluated by central authority

Minhas et al. (2011), Sedjelmaci & Senouci (2015)
  • Majority Opinion

Li et al. (2012), Li et al. (2013)
  • Centralized trust management

Gazdar, Belghith & Abutair (2018), Haddadou, Rachedi & Ghamri-Doudane (2014)
  • Malicious node detection

Ahmed, Al-Rubeaai & Tepe (2017), Wei, Yu & Boukerche (2014)
  • Direct trust

Shaikh & Alzahrani (2014), Ya, Shihui & Bin (2015)
  • Time-based

Alagar & Wan (2015), Minhas et al. (2011)
  • Agent-based

Soleymani et al. (2017)
  • Fuzzy logic

  • Local ID authentication

Ahmed, Al-Rubeaai & Tepe (2017)
  • Attack based model

Ahmad, Franqueira & Adnane (2018)
  • Mobility behavior

Biswas, Sanzgiri & Upadhyaya (2016)
  • long term trust relationship

Hussain et al. (2016)
  • Person(driver) based

  • Email-ID associated trust

  • Social media

Sedjelmaci & Senouci (2015)
  • Attack based

Haddadou, Rachedi & Ghamri-Doudane (2014)
  • Credit allocation

  • Distributed trust evaluation

Rawat et al. (2015)
  • Deterministic

Ya, Shihui & Bin (2015)
  • Response-time

Abdelaziz, Lagraa & Lakas (2014)
  • Continuous link stability

  • Piggybacking

  • Local trust evaluation

Wahab, Otrok & Mourad (2014)
  • Hope (1,2,3)

  • Reward-based

Wei, Yu & Boukerche (2014)
  • Recommendation

Yang (2013)
  • Similarity (data, node) theory

Chen & Wei (2013)
  • Beacon-based

Li et al. (2013)
  • Reputation-based

Zhang, Chen & Cohen (2013)
  • Peer-based opinion

Monir, Abdel-Hamid & El Aziz (2013)
  • Driver ID based trust

Rehman et al. (2013)
  • Thread-based

Li et al. (2012)
  • Reputation score

  • Feedback score(opinion)

Gazdar et al. (2012)
  • Distributed trust management

Sahoo et al. (2012)
  • Ant colony message routing

Mármol & Pérez (2012)
  • Reward or punishment

  • 3 level fuzzy trust

Minhas et al. (2011)
  • Decentralized

Biswas, Misic & Misic (2011)
  • ID-based

  • Certificate less

  • Public key

Wu, Ma & Zhang (2011)
  • Observation reports

  • Feedback

Raya et al. (2008)
  • Different trust combined

  • Weighted voting