Model | Theory | Individual differences | Network topology | Message review | Relationship between nodes | Device security |
Signes [10] | BI | Yes | No | No | No | No |
Xiao [11] | BI | Yes | No | Yes | Yes | Yes |
Xiao [12] | DE | No | No | No | No | No |
Xiao [13] [14] | DE | No | No | No | No | No |
Jia [15] | BI | Yes | No | No | Yes | Yes |
Zhang [16] | DE | No | Yes | No | No | No |
Liu [16] | DE | No | Yes | No | No | No |
Hosseini [17] [18] [19] | DE | No | Yes | No | No | Yes |
Gan [20] | DE | No | No | No | No | No |
Huang [21] | DE | No | Yes | No | No | No |
Liu [22] [23] | DE | No | Yes | No | No | No |
Selvam [24] | DE | No | Yes | No | No | No |
Yun [25] | SP | No | Yes | Yes | Yes | No |
Peng [26] [27] | SP | No | No | Yes | Yes | Yes |