From: A survey of local/cooperative-based malicious information detection techniques in VANETs
MDS | Decentralization | Data scarcity | Scalability | Metrics | Confidence | Security | Privacy | Robust | (FP) Rate | Applications | Â |
---|---|---|---|---|---|---|---|---|---|---|---|
(PFBD) [79] | + | + | + | - | + | + | + | - | Low | Position data | Â |
(BPBTS) [80] | + | + | - | + | + | + | - | + | Low | Traffic signal | Â |
(SBTMS) [81] | + | + | + | + | - | - | - | - | Not mentioned | Safety event | Â |
(VARS) [83] | + | + | + | + | + | - | - | - | Not mentioned | Not mentioned | Â |
(PoR) [82] | + | - | + | + | + | + | - | - | Not mentioned | Not mentioned | Â |
(ERS) [84] | + | + | + | - | + | + | - | - | Not mentioned | PCN,CRN | Â |
(ERM) [85] | + | + | + | + | + | - | - | - | Low | Not mentioned | Â |
(CAO) [86] | + | + | - | + | + | + | + | - | Low | PCN | Â |
(MBRMS) [87] | + | + | + | - | + | - | + | - | High | PCN, CRN | Â |