“…Various MANET authentication schemes are reviewed in this work as shown in Fig 1, which comprises [7], Timestamp method [8], GASMAN [9], Poissonization scheme [10], SUPERMAN [11], PCA [37], RIPsec [38], peer-to-peer model [44], HEAP [48] schemes. In addition, models like JATC scheme [12], Dempster-Shafer [14], SDRAC [16], IBBE scheme [5] [46], Trilateration Model [18], DSR [20], DTD method [21], Hashing Algorithm [28], Netpro [30], GS scheme [32], QASEC [33], BSG [35], DTQCAR [36], CLPKM [39], Tidal trust algorithm [47], E-voting protocol [54], NACK [58], LIPG [59], IDDIP [60] and Game theoretic Model [65] are also adopted in different contributions.…”