Skip to main content

Advertisement

Table 3 Trusted based detection schemes

From: A survey of local/cooperative-based malicious information detection techniques in VANETs

MDS Decentralization Data scarcity Scalability Metrics Confidence Security Privacy Robust (FP) Rate Applications  
(PFBD) [79] + + + - + + + - Low Position data  
(BPBTS) [80] + + - + + + - + Low Traffic signal  
(SBTMS) [81] + + + + - - - - Not mentioned Safety event  
(VARS) [83] + + + + + - - - Not mentioned Not mentioned  
(PoR) [82] + - + + + + - - Not mentioned Not mentioned  
(ERS) [84] + + + - + + - - Not mentioned PCN,CRN  
(ERM) [85] + + + + + - - - Low Not mentioned  
(CAO) [86] + + - + + + + - Low PCN  
(MBRMS) [87] + + + - + - + - High PCN, CRN