Explain SEAD, SAR and SPAAR routing protocols in more details. Solution SEAD Protocols: SEAD is a proactive secure routing protocol based on DSDV-SQ-protocol. It does not rely on asymmetric encryption primitive but instead it relies on one-way hash chain for security. The algorithm expects that there is some authenticated and secure way to deliver the initial key KN. This could be done by key delivery in advance or by using public key encryption and signatures for key delivery. The basic idea of SEAD is, to authenticate the sequence number and metric of a routing table update message using hash chains elements. In addition, the receiver also authenticates the sender ensuring that the routing information originates from the correct node. The source of each routing update message in SEAD must also be authenticated since an attacker may be able to create routing loops through the impersonation attack. There are two different approaches proposed such as broadcast authentication mechanism, TESLA and Message Authentication Codes SAR routing protocols: SAR takes an approach to routing that incorporates security level of nodes into traditional routing metrics. In most protocols the length of the route is the only metric used. It does not target any protocol, but it rather provides security at a more generalized level of security. The goal is exposing security to the application and to the routing protocol. SAR uses AODV or DSR as a base protocol; it embeds the security metric into RREQ packet itself and changes the forwarding behavior of the protocol. When intermediate nodes receive an RREQ packet with a particular security metric or trust level, the node can only process the packet or forward it if it can provide the required security or trust level. SPAAR routing protocols: The SPAAR protocol was developed with the classical managed- hostile environment in mind, thus meant to provide a very high level of security, and sometimes at the cost of performance. Among other things, SPAAR also requires that each device to use a GPS locator to determine its position, although some leeway is given to nodes using a so-called “locator-proxy” if absolute security is not required. In SPAAR packets are only accepted between neighboring nodes one hop away from each other, this is to avoid the “invisible node- attack”. The basic transmission procedure is quite similar to ARAN, although the group neighborhood key is used for encryption in order to ensure one-hop communication only. Since all nodes also have information on their location they only forward RREQs if their position is closer to the destination position.