“…In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; - Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ]. In the case of routing, both proactive routing protocols (e.g., the IPv6 Routing Protocol for low-power and lossy networks (RPL) and optimized link state routing (OLSR)) and reactive routing protocols (e.g., ad hoc on-demand distance vector (AODV) and link-quality source routing (LQSR)) have been proposed in the literature to solve the drawbacks of LLNs and MANETs [ 44 , 45 ];
- Social Trustworthiness: This trend has gained more attention since the irruption of the Social Internet of Things (SIoT) concept [ 48 , 49 ].
…”