Table 15.
Selected Parameters for EDAS.
| Criteria | Non-Beneficial | Beneficial | |||
|---|---|---|---|---|---|
| Probability | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
| Authors and Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
| Amin et al. [80] | 11.05 | 992 | 0 | 0.5 | 0 |
| Wang and Liu [69] | 57.08 | 3584 | 0 | 0 | 0.5 |
| Li and Hong [70] | 42.35 | 3584 | 0 | 0 | 0 |
| Jawaid et al. [83] | 7.735 | 752 | 0 | 1 | 0 |
| Mutaz et al. [71] | 83.67 | 2560 | 1 | 0 | 1 |
| Lu et al. [72] | 216.76 | 8704 | 1 | 0 | 1 |
| Li et al. [73] | 88.98 | 3584 | 1 | 0 | 1 |
| Prameela & Ponmuthuramalingam [74] | 26.55 | 2560 | 1 | 0 | 1 |
| Omala et al. [75] | 85.64 | 2560 | 1 | 0 | 1 |
| Omala et al. [81] | 13.26 | 992 | 1 | 0.5 | 1 |
| Gao et al. [82] | 15.47 | 1472 | 1 | 0.5 | 1 |
| Ullah et al. [84] | 8.84 | 672 | 0 | 1 | 0 |
| Jawaid et al. [76] | 83.67 | 2560 | 1 | 0 | 1 |
| Noor et al. [85] | 7.735 | 672 | 0 | 1 | 0 |
| Hu et al. [77] | 86.67 | 5632 | 1 | 0 | 1 |