|
Schemes | Advantages | Disadvantages |
|
TWOACK [14] | Can be easily added to source routing protocols such as the DSR protocol | Greatly increases conflict and collision of network messages |
CHEMAS [15] | Reduce the conflict and collision of network messages | Cannot resist the collusive attacks |
PHACK [16] | Not only can detect a selective forwarding attack but also can recover the routing from the location at which the data were dropped | The scheme produces more ACK packets, which will consume more energy |
MNDREL [17] | By analyzing the reputation value for the parent node evaluated by the child node, the malicious nodes in the network are effectively identified | The real-time performance of the deletion model has to be improved |
GRFSN [18] | This scheme only needs to determine a trust threshold | Need complex evaluation model and the trust threshold is static, and the misjudgment rate of normal nodes being judged as malicious nodes is high |
DNSMTM [19] | Can effectively detect malicious nodes and, with a higher detection rate, reduce the energy consumption of nodes | Need a complex evaluation model and the responsibility of monitoring nodes is too heavy |
MSGSFS [20] | Can effectively alleviate selective forwarding attack and has less energy consumption | Need a complex game model and it can only solve the malicious packet loss behavior of single-hop nodes |
ITEMBB [21] | The model overcomes the limitations of subjective weight allocation | Need complex evaluation model and the problem of static reputation value has not been solved |
SMCSF [22] | Combine the neighbor node monitoring and watchdog mechanism | The responsibility of monitoring nodes is also heavy |
IDSBS [23] | The collected information and its treatment are performed in a distributed way | The false detection rate of the system is high in the initial stage |
MCMND [24] | Use multivariate classification to classify nodes | The false detection rate is high |
BTM [25] | Using a blockchain intelligent contract, which can ensure the traceability of the detection process | The consensus method in the model is the traditional POW workload proof method, which requires relatively large computational power and high energy consumption |
IPA [26] | Each node maintains a suspicious node set | Need n rounds of detection, which will greatly increase the network communication overhead |
|