“…Iman M. Almomani et al [6], Shreenivas Jog et al [7], Mashiur Rahman et al [10], B.Pournima et al [16], and P.Verma et al [13] follow robustness by showing great stability and robust message transfer protocol, while rest of the techniques do not have this quality parameter. All techniques can be formally validated except Pattarakamon Rangsee et al [8] O.O.Alharaki et al [12], Dalip et al [15] and B.Pournima et al [16] which do not show any concern about validation .In some techniques simulation method is used for validation purpose. Only few techniques B.Pournima et al [16], M.S.Sutaon et al [5], Iman M. Almomani et al [6], Shreenivas Jog et al [7], Pattarakamon Rangsee et al [8], Georges Challita et al [4] and R.Immanuel Rajkumar et al [9] are verified through experimentation and different types of testing while the rest are not verifiable.…”