|
Paper | Approach | Encryption algorithm | Key distribution | Central trust authority | Authentication | Confidentiality | Integrity | Hash function |
|
[17] | Secure self-configured spontaneous network protocol | AES | RSA | Distributed CA | ✓ | ✓ | ✓ | SHA-1 |
[26] | IKM, an ID-based key management scheme | RSA | Threshold cryptography | Certificateless | ✓ | ✓ | ✓ | SHA-1 |
[27] | Secured routing protocol along with PKI, firewall, and IPS | AES | RSA | Centralized certification authority within an ecosystem | × | ✓ | ✓ | SHA-512 |
[28] | Trust-enhanced ad hoc on-demand multipath distance vector protocol (TeAOMDV) | × | × | Distributed trust-based mechanism not CA | ✓ | × | ✓ | MAC (message authentication code) |
[33] | Trust-based certificate revocation for secure routing (TCRSR) protocol | Threshold cryptography | Threshold cryptography | Chain certificate | × | ✓ | ✓ | × |
[35] | Fuzzy enhanced secure multicast routing (FSMR) | - | - | Certificateless | ✓ | ✓ | ✓ | ✓ |
[36] | AODV with a fuzzy-based trust model | RSA | RSA | Centralized certificate authority | ✓ | ✓ | ✓ | MD4 |
[38] | Resistive to selective drop attack (RSDA) | ECC | - | - | ✓ | ✓ | ✓ | ✓ |
[39] | Encrypted trust-based dolphin glowworm optimization (E-TDGO) | AES-128 | - | Mutual trust relationship | × | ✓ | × | × |
[31] | Random predistribution key approaches (RDK) | × | Random prekey distribution | - | - | × | - | - |
Analytical modeling |
[29] | Stochastic Beer–Quiche multipath routing (SBQMR), a theoretical model | - | - | - | ✓ | - | - | - |
Stochastic multipath routing mechanism is adopted based on Beer–Quiche theoretical model |
[34] | Fuzzy-based stable and secure routing (FBSSR) | - | - | - | - | - | - | - |
Trust-based next forwarding node selection algorithm (TNFNS)+analytical analysis |
|