Parameters | Proposed trust scheme | CBTRP [59] | 2ACK [39] |
---|---|---|---|
Rate of detection | High | Low | Low |
Detection method | Hybrid trust-based clustering method | Trust based | Acknowledgement based |
False alarm | Low | High | High |
Attacks analysed | Flooding attack, wormhole attack, black hole attack, rushing attack, impersonation and Sybil attack | Routing attacks, packet dropping, packet spoofing | Routing attacks, packet dropping |