Trust metric

Malicious behavior

1

Data forward

All types of packet loss attacks (black hole, gray hole, selective forwarding)

2

ACK confirm

The node does not confirm the ACK

3

Data integrity

Data tampering attack

4

Data flooding

Forward a large amount of data in a period of time

5

Data duplication

Delivery the same data repeatedly to the same node

6

Trust value response

In the trust exchange, the trust value is not returned to the requesting node

7

Trust value verification

“Badmouth” attack