Analysis of Various Trust Computation Methods: A Step toward Secure FANETs