Research Article

A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network

Table 2

Summary of existing approaches.

PaperApproachEncryption algorithmKey distributionCentral trust authorityAuthenticationConfidentialityIntegrityHash function

[17]Secure self-configured spontaneous network protocolAESRSADistributed CASHA-1
[26]IKM, an ID-based key management schemeRSAThreshold cryptographyCertificatelessSHA-1
[27]Secured routing protocol along with PKI, firewall, and IPSAESRSACentralized certification authority within an ecosystem×SHA-512
[28]Trust-enhanced ad hoc on-demand multipath distance vector protocol (TeAOMDV)××Distributed trust-based mechanism not CA×MAC (message authentication code)
[33]Trust-based certificate revocation for secure routing (TCRSR) protocolThreshold cryptographyThreshold cryptographyChain certificate××
[35]Fuzzy enhanced secure multicast routing (FSMR)--Certificateless
[36]AODV with a fuzzy-based trust modelRSARSACentralized certificate authorityMD4
[38]Resistive to selective drop attack (RSDA)ECC--
[39]Encrypted trust-based dolphin glowworm optimization (E-TDGO)AES-128-Mutual trust relationship×××
[31]Random predistribution key approaches (RDK)×Random prekey distribution--×--
Analytical modeling
[29]Stochastic Beer–Quiche multipath routing (SBQMR), a theoretical model------
Stochastic multipath routing mechanism is adopted based on Beer–Quiche theoretical model
[34]Fuzzy-based stable and secure routing (FBSSR)-------
Trust-based next forwarding node selection algorithm (TNFNS)+analytical analysis