Research Article

Towards a Novel Trust-Based Multicast Routing for VANETs

Figure 6

Performance with varying the number of malicious nodes.
(a) Packet delivery ratio
(b) End-to-end delay
(c) Control overhead