“…We can classify all the works that try to mitigate and stimulate the misbehaved or uncooperative node into four categories: “credit-based systems” (Anderegg and Eidenbenz, 2003; Buttyan and Hubaux, 2001; Jiang et al , 2015; Yang et al , 2002; Zhong et al , 2003), “acknowledgement-based systems” (Liu et al , 2007; Padmanabhan and Simon, 2003; Xue and Nahrstedt, 2004), “trust management and reputation-based systems” (Buchegger and Le Boudec, 2002; He et al , 2004; Marti et al , 2000; Michiardi and Molva, 2002; Sen, 2010; Velloso et al , 2010) and “trust-based routing protocols” (De Rango and Marano, 2009; Ghosh et al , 2005; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Serique and De Sousa, 2012; Wang and Wu, 2011; Xia, Jia, Ju, Li and Sha, 2013; Xia et al , 2015). Some of the related previous works that have been carried out in order to make ad hoc networks more trustworthy are explained in this section.…”