“…In (Tanachaiwiwat, Dave, Bhindwale and Helmy, 2003;Yao, Kim, Lee, Kim and Jang, 2005) authors define reputation metrics related to cryptographic operation, availability of nodes to provide service, and nodes behaviour that can indicate malicious activity. In (Crosby, Pissinou and Gadze, 2006), authors follow a similar trust evaluation approach to aid the election of trustworthy cluster heads. Another approach is taken by (Liu, Abu-Ghazaleh and Kang, 2007) where they not only favour well behaving nodes for each successful packet forwarding, but also penalize suspicious nodes that lie about their contribution to routing.…”