Skip to main content

Table 5 Security comparison of various existing protocols

From: WRSR: wormhole-resistant secure routing for wireless mesh networks

Protocol

Employed mechanism

Extra hardware

Hidden mode

Participation mode

WRSR

Connectivity information

No

Yes

Yes

Packet leashes [3]

GPS & clock

Yes

Yes

No

Wang et al. [14]

Neighbourhood information

No

Yes

No

DeWorm [20]

Neighbourhood information

No

Yes

No

ODSBR [5]

Binary search

No

Yes

Yes

SPROUT [22]

Multipath routing

No

Yes

Yes

EDWA [7]

Neighbourhood information

No

Yes

No

Znaidi et al. [16]

Neighbourhood information

No

Yes

No

WARP [17]

Multiple link-disjoint paths

No

Yes

Yes