5) Majority Voting System: The majority voting system
is partly responsible for mitigating attacks on the network.
When invoked, the majority voting system communicates with
the node’s neighbours regarding a potential attack. By using
majority voting, more than one node on the network decides
whether a particular node is behaving maliciously. This leads
to a more robust system since the network would take into
consideration the “opinion” of more than one nodes when
trying to determine if a node is behaving maliciously. Once
a malicious node is decided on, it can be evicted from
the network through blacklisting and/or key revocation. The
literature goes into detail regarding majority voting [18] and key revocation [19]. The inner workings of majority voting
and key revocation protocols are outside of the scope of this
paper.