Table 1 Comparison of traditional trust evaluation mechanisms in UWSNs.
Refs. | Methodology | Strengths | Limitations |
|---|---|---|---|
Direct observation | Simple and efficient | Limited to direct interactions | |
Indirect evaluation | Expands trust evaluation scope | Relies on third-party feedback | |
Data-centric evaluation | Focuses on data reliability | May not capture all malicious behaviors | |
Hybrid model | Comprehensive and robust | Complexity in implementation |