Trust metric | Malicious behavior | |
1 | Data forward | All types of packet loss attacks (black hole, gray hole, selective forwarding) |
2 | ACK confirm | The node does not confirm the ACK |
3 | Data integrity | Data tampering attack |
4 | Data flooding | Forward a large amount of data in a period of time |
5 | Data duplication | Delivery the same data repeatedly to the same node |
6 | Trust value response | In the trust exchange, the trust value is not returned to the requesting node |
7 | Trust value verification | “Badmouth” attack |