Skip to main content

Table 2 Comparison of various MANET models

From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks

Parameters

Proposed trust scheme

CBTRP [59]

2ACK [39]

Rate of detection

High

Low

Low

Detection method

Hybrid trust-based clustering method

Trust based

Acknowledgement based

False alarm

Low

High

High

Attacks analysed

Flooding attack, wormhole attack, black hole attack, rushing attack, impersonation and Sybil attack

Routing attacks, packet dropping, packet spoofing

Routing attacks, packet dropping