Research Article

Secure Multicast Routing Algorithm for Wireless Mesh Networks

Table 1

Security comparison of different protocols.

ProtocolMetric manipulation attackRoute corruption attackRouting loop attackWormhole attack

SAODV [5] Resistant Not resistant Resistant Not resistant
ARAN [6] Resistant Not resistant Not resistant Not resistant
Ariadne [11] Resistant Not resistant Resistant Not resistant
SRP [12] Not resistant Not resistant Resistant Not resistant
SODMRP [17] Resistant Not resistant Resistant Not resistant
EMRAW [18] Not resistant Not resistant Not resistant Not resistant
SEMRAW Resistant Resistant Resistant Resistant