Table 20.
Weighted Sum of NDA.
| Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements | |
|---|---|---|---|---|---|---|
| Amin et al. [80] | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Wang and Liu [69] | 0.0049649 | 0.0630137 | 0.2 | 0.2 | 0.2 | 0.66797859 |
| Li and Hong [70] | 0 | 0.0630137 | 0.2 | 0.2 | 0.2 | 0.6630137 |
| Jawaid et al. [83] | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Mutaz et al. [71] | 0.1004452 | 0 | 0 | 0.2 | 0.2 | 0.50044522 |
| Lu et al. [72] | 0.5783496 | 0.43874755 | 0 | 0.2 | 0.2 | 1.41709717 |
| Li et al. [73] | 0.1195126 | 0.0630137 | 0 | 0.2 | 0.2 | 0.58252626 |
| Prameela & Ponmuthuramalingam [74] | 0 | 0 | 0 | 0.2 | 0.2 | 0.4 |
| Omala et al. [75] | 0.1075192 | 0 | 0 | 0.2 | 0.2 | 0.50751917 |
| Omala et al. [81] | 0 | 0 | 0 | 0 | 0.2 | 0.2 |
| Gao et al. [82] | 0 | 0 | 0 | 0 | 0.2 | 0.2 |
| Ullah et al. [84] | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Jawaid et al. [76] | 0.1004452 | 0 | 0 | 0.2 | 0.2 | 0.50044522 |
| Noor et al. [85] | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Hu et al. [77] | 0.1112177 | 0.21330724 | 0 | 0.2 | 0.2 | 0.72452497 |