From: A survey of local/cooperative-based malicious information detection techniques in VANETs
MDS | Type | Drawback | Privacy | Position | Delay | Overhead | (FP) Rate | Applications | Â |
---|---|---|---|---|---|---|---|---|---|
IDS/RC2RL [65] | Behaviour | Performance degradation in case of sparse network | No | Yes | High | Low | Min | Position data | Â |
(RCBD) [9] | Behaviour | Loss of acknowledgement due to bad signal | No | Yes | High | High | Min | CRN | Â |
(DBD) [66] | Consistency | No validation for performance evaluation | Yes | Yes | High | High | Not mentioned | Not mentioned | Â |
(DBSSI) [67] | Consistency | Minimum threshold might create more false positive rate | No | Yes | High | Low | Min | Â | Â |
(SIBD) [68] | Consistency | Malicious nodes can generate secondary information in low density network | No | No | Low | Low | Min | PCN | Â |
RD4 [69] | Consistency | Degradation in accuracy due to high mobility | No | No | Low | Low | Min | PCN | Â |
(VARM) [70] | Consistency | Computation overhead for single node | No | Yes | Low | High | Not mentioned | Not mentioned | Â |
(DWD) [71] | Consistency | Detection will take more time in case of increase in malicious nodes | Yes | Yes | Low | Low | Max | CRN | Â |
(FHR) [23] | Consistency | Mechanism uses for static events | Yes | Yes | High | Low | Not mentioned | PCN | Â |
(C-DAC) [3] | Consistency | Multiple malicious nodes can degrade performance | No | Yes | High | High | Not mention | PCN,CRN | Â |
(Host IDS) [73] | Consistency | Honest neighbour nodes must be prerequisite for detection | No | Yes | High | Low | Min | PCN,CRN | Â |
(SLBD) [22] | Consistency | More parameters can be used for accurate result | No | Yes | Low | High | Min | Position data | Â |