Research Article
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Table 1
Security comparison of different protocols.
| Protocol | Metric manipulation attack | Route corruption attack | Routing loop attack | Wormhole attack |
| SAODV [5] | Resistant | Not resistant | Resistant | Not resistant | ARAN [6] | Resistant | Not resistant | Not resistant | Not resistant | Ariadne [11] | Resistant | Not resistant | Resistant | Not resistant | SRP [12] | Not resistant | Not resistant | Resistant | Not resistant | SODMRP [17] | Resistant | Not resistant | Resistant | Not resistant | EMRAW [18] | Not resistant | Not resistant | Not resistant | Not resistant | SEMRAW | Resistant | Resistant | Resistant | Resistant |
|
|