Marmol et al. [17] |
TRIP |
Probabilistic reasoning identifies a node based on the multiple factors. |
Difficult to preserve the node’s trust and behavior, as the system does not know that the node is truthful or malicious. |
Mahmood et al. [34] |
RABTM |
Dempster–Shafer evidence theory is used for numerical trust computation. |
Probability can model all forms of uncertainty and ignorance. |
Kim et al. [14] |
CoE |
Source priorities could be adjusted by a particular event program in order to mitigate computation. |
Require data taken from the multiple sensors in order to provide reliable results. |
Ghosh et al. [28] |
Post-crash warning |
Effectively reduces the false positives and false negatives while effectively detecting misbehavior. |
Reserved only for the specific type of event. |
Lee et al. [31] |
MBRMS |
Uses outlier detection technique and misbehaving risk value of the bad node to measure the risk level. |
An event observer within one hop of reporter can observe the behavior of reporter but cannot detect behavior of reporter. |