Skip to main content

Table 3 Trusted based detection schemes

From: A survey of local/cooperative-based malicious information detection techniques in VANETs

MDS

Decentralization

Data scarcity

Scalability

Metrics

Confidence

Security

Privacy

Robust

(FP) Rate

Applications

 

(PFBD) [79]

+

+

+

-

+

+

+

-

Low

Position data

 

(BPBTS) [80]

+

+

-

+

+

+

-

+

Low

Traffic signal

 

(SBTMS) [81]

+

+

+

+

-

-

-

-

Not mentioned

Safety event

 

(VARS) [83]

+

+

+

+

+

-

-

-

Not mentioned

Not mentioned

 

(PoR) [82]

+

-

+

+

+

+

-

-

Not mentioned

Not mentioned

 

(ERS) [84]

+

+

+

-

+

+

-

-

Not mentioned

PCN,CRN

 

(ERM) [85]

+

+

+

+

+

-

-

-

Low

Not mentioned

 

(CAO) [86]

+

+

-

+

+

+

+

-

Low

PCN

 

(MBRMS) [87]

+

+

+

-

+

-

+

-

High

PCN, CRN

Â