Skip to main content
. 2021 May 19;21(10):3538. doi: 10.3390/s21103538

Table 1.

Comparison of current bogus prevention methods.

Author Method Advantages Limitations
Marmol et al. [17] TRIP Probabilistic reasoning identifies a node based on the multiple factors. Difficult to preserve the node’s trust and behavior, as the system does not know that the node is truthful or malicious.
Mahmood et al. [34] RABTM Dempster–Shafer evidence theory is used for numerical trust computation. Probability can model all forms of uncertainty and ignorance.
Kim et al. [14] CoE Source priorities could be adjusted by a particular event program in order to mitigate computation. Require data taken from the multiple sensors in order to provide reliable results.
Ghosh et al. [28] Post-crash warning Effectively reduces the false positives and false negatives while effectively detecting misbehavior. Reserved only for the specific type of event.
Lee et al. [31] MBRMS Uses outlier detection technique and misbehaving risk value of the bad node to measure the risk level. An event observer within one hop of reporter can observe the behavior of reporter but cannot detect behavior of reporter.