“…However, GS schemes are usually based on PKI, and message sender authentication cannot prevent legitimate nodes from sending malicious messages. [5], ESA [17], IBGS [18], GSIS [19], IBV [20], EGSS [21], iTrust [22], PMBP [23] STRM [13], TRIP [24], RaBTM [25] Non-infrastructure based ETM [26], MTM [27], LSOT [28], BTM [29] CTID [14], ITM [15], RMCV [30], ERM [31], VARS [32], TMEP [33], CRMS [34] Trust management schemes in the second category require infrastructure including roadside unit or central authority without using PKI [13,24,25]. Schemes such as Trust and Reputation Infrastructure-based Proposal (TRIP) [24] and road side unit (RSU) and Beacon-Based Trust Management (RaBTM) [25] may not work if infrastructure is not available.…”