SlideShare a Scribd company logo
Explain SEAD, SAR and SPAAR routing protocols in more details.
Solution
SEAD Protocols: SEAD is a proactive secure routing protocol based on DSDV-SQ-protocol. It
does not rely on asymmetric encryption primitive but instead it relies on one-way hash chain for
security. The algorithm expects that there is some authenticated and secure way to deliver the
initial key KN. This could be done by key delivery in advance or by using public key encryption
and signatures for key delivery. The basic idea of SEAD is, to authenticate the sequence number
and metric of a routing table update message using hash chains elements. In addition, the
receiver also authenticates the sender ensuring that the routing information originates from the
correct node. The source of each routing update message in SEAD must also be authenticated
since an attacker may be able to create routing loops through the impersonation attack. There are
two different approaches proposed such as broadcast authentication mechanism, TESLA and
Message Authentication Codes
SAR routing protocols: SAR takes an approach to routing that incorporates security level of
nodes into traditional routing metrics. In most protocols the length of the route is the only metric
used. It does not target any protocol, but it rather provides security at a more generalized level of
security. The goal is exposing security to the application and to the routing protocol. SAR uses
AODV or DSR as a base protocol; it embeds the security metric into RREQ packet itself and
changes the forwarding behavior of the protocol. When intermediate nodes receive an RREQ
packet with a particular security metric or trust level, the node can only process the packet or
forward it if it can provide the required security or trust level.
SPAAR routing protocols: The SPAAR protocol was developed with the classical managed-
hostile environment in mind, thus meant to provide a very high level of security, and sometimes
at the cost of performance. Among other things, SPAAR also requires that each device to use a
GPS locator to determine its position, although some leeway is given to nodes using a so-called
“locator-proxy” if absolute security is not required. In SPAAR packets are only accepted
between neighboring nodes one hop away from each other, this is to avoid the “invisible node-
attack”. The basic transmission procedure is quite similar to ARAN, although the group
neighborhood key is used for encryption in order to ensure one-hop communication only. Since
all nodes also have information on their location they only forward RREQs if their position is
closer to the destination position

More Related Content

Similar to Explain SEAD, SAR and SPAAR routing protocols in more details.So.pdf

Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
BRNSSPublicationHubI
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
IAEME Publication
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
IAEME Publication
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destributionsalehsl
 
Identity Based Secure Routing For Wireless Ad-Hoc Networks
Identity Based Secure Routing For Wireless Ad-Hoc NetworksIdentity Based Secure Routing For Wireless Ad-Hoc Networks
Identity Based Secure Routing For Wireless Ad-Hoc Networks
IDES Editor
 
564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides
Muthukrishnan008
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
IJMER
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196IJMER
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Editor IJARCET
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
IJSRD
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
IJCERT
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
ijceronline
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
pijans
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
pijans
 

Similar to Explain SEAD, SAR and SPAAR routing protocols in more details.So.pdf (20)

Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destribution
 
Pres
PresPres
Pres
 
Identity Based Secure Routing For Wireless Ad-Hoc Networks
Identity Based Secure Routing For Wireless Ad-Hoc NetworksIdentity Based Secure Routing For Wireless Ad-Hoc Networks
Identity Based Secure Routing For Wireless Ad-Hoc Networks
 
564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides564 patel mokbel_shushanz_survey_slides
564 patel mokbel_shushanz_survey_slides
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
ant2
ant2ant2
ant2
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 

More from arihanthtextiles

I need help writing the methods for the song and playList class in J.pdf
I need help writing the methods for the song and playList class in J.pdfI need help writing the methods for the song and playList class in J.pdf
I need help writing the methods for the song and playList class in J.pdf
arihanthtextiles
 
How do autopolyploidy and allopolyploidy differ Only autopolyploidy.pdf
How do autopolyploidy and allopolyploidy differ  Only autopolyploidy.pdfHow do autopolyploidy and allopolyploidy differ  Only autopolyploidy.pdf
How do autopolyploidy and allopolyploidy differ Only autopolyploidy.pdf
arihanthtextiles
 
How do you find the order of growth for the following recurrenceT.pdf
How do you find the order of growth for the following recurrenceT.pdfHow do you find the order of growth for the following recurrenceT.pdf
How do you find the order of growth for the following recurrenceT.pdf
arihanthtextiles
 
Dynamic routing protocols are used toa) establish paths real ti.pdf
Dynamic routing protocols are used toa) establish paths real ti.pdfDynamic routing protocols are used toa) establish paths real ti.pdf
Dynamic routing protocols are used toa) establish paths real ti.pdf
arihanthtextiles
 
Evaluate expression without a calculator. Write answer in radians..pdf
Evaluate expression without a calculator. Write answer in radians..pdfEvaluate expression without a calculator. Write answer in radians..pdf
Evaluate expression without a calculator. Write answer in radians..pdf
arihanthtextiles
 
Epithelial tissues that are only one cell thick are called _____ Epi.pdf
Epithelial tissues that are only one cell thick are called _____  Epi.pdfEpithelial tissues that are only one cell thick are called _____  Epi.pdf
Epithelial tissues that are only one cell thick are called _____ Epi.pdf
arihanthtextiles
 
Describe in five sentences how the TLR system is used to fight HSV-1 .pdf
Describe in five sentences how the TLR system is used to fight HSV-1 .pdfDescribe in five sentences how the TLR system is used to fight HSV-1 .pdf
Describe in five sentences how the TLR system is used to fight HSV-1 .pdf
arihanthtextiles
 
Daunte is frustrated about managements recent decision to merge hi.pdf
Daunte is frustrated about managements recent decision to merge hi.pdfDaunte is frustrated about managements recent decision to merge hi.pdf
Daunte is frustrated about managements recent decision to merge hi.pdf
arihanthtextiles
 
Concern over the weather associated with El Nino has increased intere.pdf
Concern over the weather associated with El Nino has increased intere.pdfConcern over the weather associated with El Nino has increased intere.pdf
Concern over the weather associated with El Nino has increased intere.pdf
arihanthtextiles
 
Clostridium difficile is a bacteria currently making headlines. It h.pdf
Clostridium difficile is a bacteria currently making headlines. It h.pdfClostridium difficile is a bacteria currently making headlines. It h.pdf
Clostridium difficile is a bacteria currently making headlines. It h.pdf
arihanthtextiles
 
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdfYou cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
arihanthtextiles
 
You have constructed a new reporter gene to help you find novel zebr.pdf
You have constructed a new reporter gene to help you find novel zebr.pdfYou have constructed a new reporter gene to help you find novel zebr.pdf
You have constructed a new reporter gene to help you find novel zebr.pdf
arihanthtextiles
 
Write a Java program that will incorporate either a sequential searc.pdf
Write a Java program that will incorporate either a sequential searc.pdfWrite a Java program that will incorporate either a sequential searc.pdf
Write a Java program that will incorporate either a sequential searc.pdf
arihanthtextiles
 
Answer only with excel instructions.Assume that 96 of ticket hold.pdf
Answer only with excel instructions.Assume that 96 of ticket hold.pdfAnswer only with excel instructions.Assume that 96 of ticket hold.pdf
Answer only with excel instructions.Assume that 96 of ticket hold.pdf
arihanthtextiles
 
A new species of sea horse has been discovered and is being sequenced.pdf
A new species of sea horse has been discovered and is being sequenced.pdfA new species of sea horse has been discovered and is being sequenced.pdf
A new species of sea horse has been discovered and is being sequenced.pdf
arihanthtextiles
 
Which of the following is the mechanism of action for Herceptin Her.pdf
Which of the following is the mechanism of action for Herceptin  Her.pdfWhich of the following is the mechanism of action for Herceptin  Her.pdf
Which of the following is the mechanism of action for Herceptin Her.pdf
arihanthtextiles
 
Which of these statements best describes an element An element is c.pdf
Which of these statements best describes an element  An element is c.pdfWhich of these statements best describes an element  An element is c.pdf
Which of these statements best describes an element An element is c.pdf
arihanthtextiles
 
What is the general goal for descriptive statistics How is the goal.pdf
What is the general goal for descriptive statistics  How is the goal.pdfWhat is the general goal for descriptive statistics  How is the goal.pdf
What is the general goal for descriptive statistics How is the goal.pdf
arihanthtextiles
 
What effects are shown on this graph (assume that all effects where.pdf
What effects are shown on this graph (assume that all effects where.pdfWhat effects are shown on this graph (assume that all effects where.pdf
What effects are shown on this graph (assume that all effects where.pdf
arihanthtextiles
 
What are adaptive peaks How do organisms move from one adaptive pea.pdf
What are adaptive peaks How do organisms move from one adaptive pea.pdfWhat are adaptive peaks How do organisms move from one adaptive pea.pdf
What are adaptive peaks How do organisms move from one adaptive pea.pdf
arihanthtextiles
 

More from arihanthtextiles (20)

I need help writing the methods for the song and playList class in J.pdf
I need help writing the methods for the song and playList class in J.pdfI need help writing the methods for the song and playList class in J.pdf
I need help writing the methods for the song and playList class in J.pdf
 
How do autopolyploidy and allopolyploidy differ Only autopolyploidy.pdf
How do autopolyploidy and allopolyploidy differ  Only autopolyploidy.pdfHow do autopolyploidy and allopolyploidy differ  Only autopolyploidy.pdf
How do autopolyploidy and allopolyploidy differ Only autopolyploidy.pdf
 
How do you find the order of growth for the following recurrenceT.pdf
How do you find the order of growth for the following recurrenceT.pdfHow do you find the order of growth for the following recurrenceT.pdf
How do you find the order of growth for the following recurrenceT.pdf
 
Dynamic routing protocols are used toa) establish paths real ti.pdf
Dynamic routing protocols are used toa) establish paths real ti.pdfDynamic routing protocols are used toa) establish paths real ti.pdf
Dynamic routing protocols are used toa) establish paths real ti.pdf
 
Evaluate expression without a calculator. Write answer in radians..pdf
Evaluate expression without a calculator. Write answer in radians..pdfEvaluate expression without a calculator. Write answer in radians..pdf
Evaluate expression without a calculator. Write answer in radians..pdf
 
Epithelial tissues that are only one cell thick are called _____ Epi.pdf
Epithelial tissues that are only one cell thick are called _____  Epi.pdfEpithelial tissues that are only one cell thick are called _____  Epi.pdf
Epithelial tissues that are only one cell thick are called _____ Epi.pdf
 
Describe in five sentences how the TLR system is used to fight HSV-1 .pdf
Describe in five sentences how the TLR system is used to fight HSV-1 .pdfDescribe in five sentences how the TLR system is used to fight HSV-1 .pdf
Describe in five sentences how the TLR system is used to fight HSV-1 .pdf
 
Daunte is frustrated about managements recent decision to merge hi.pdf
Daunte is frustrated about managements recent decision to merge hi.pdfDaunte is frustrated about managements recent decision to merge hi.pdf
Daunte is frustrated about managements recent decision to merge hi.pdf
 
Concern over the weather associated with El Nino has increased intere.pdf
Concern over the weather associated with El Nino has increased intere.pdfConcern over the weather associated with El Nino has increased intere.pdf
Concern over the weather associated with El Nino has increased intere.pdf
 
Clostridium difficile is a bacteria currently making headlines. It h.pdf
Clostridium difficile is a bacteria currently making headlines. It h.pdfClostridium difficile is a bacteria currently making headlines. It h.pdf
Clostridium difficile is a bacteria currently making headlines. It h.pdf
 
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdfYou cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
You cloned an EcoRI digested DNA fragment into a unique EcoRI site o.pdf
 
You have constructed a new reporter gene to help you find novel zebr.pdf
You have constructed a new reporter gene to help you find novel zebr.pdfYou have constructed a new reporter gene to help you find novel zebr.pdf
You have constructed a new reporter gene to help you find novel zebr.pdf
 
Write a Java program that will incorporate either a sequential searc.pdf
Write a Java program that will incorporate either a sequential searc.pdfWrite a Java program that will incorporate either a sequential searc.pdf
Write a Java program that will incorporate either a sequential searc.pdf
 
Answer only with excel instructions.Assume that 96 of ticket hold.pdf
Answer only with excel instructions.Assume that 96 of ticket hold.pdfAnswer only with excel instructions.Assume that 96 of ticket hold.pdf
Answer only with excel instructions.Assume that 96 of ticket hold.pdf
 
A new species of sea horse has been discovered and is being sequenced.pdf
A new species of sea horse has been discovered and is being sequenced.pdfA new species of sea horse has been discovered and is being sequenced.pdf
A new species of sea horse has been discovered and is being sequenced.pdf
 
Which of the following is the mechanism of action for Herceptin Her.pdf
Which of the following is the mechanism of action for Herceptin  Her.pdfWhich of the following is the mechanism of action for Herceptin  Her.pdf
Which of the following is the mechanism of action for Herceptin Her.pdf
 
Which of these statements best describes an element An element is c.pdf
Which of these statements best describes an element  An element is c.pdfWhich of these statements best describes an element  An element is c.pdf
Which of these statements best describes an element An element is c.pdf
 
What is the general goal for descriptive statistics How is the goal.pdf
What is the general goal for descriptive statistics  How is the goal.pdfWhat is the general goal for descriptive statistics  How is the goal.pdf
What is the general goal for descriptive statistics How is the goal.pdf
 
What effects are shown on this graph (assume that all effects where.pdf
What effects are shown on this graph (assume that all effects where.pdfWhat effects are shown on this graph (assume that all effects where.pdf
What effects are shown on this graph (assume that all effects where.pdf
 
What are adaptive peaks How do organisms move from one adaptive pea.pdf
What are adaptive peaks How do organisms move from one adaptive pea.pdfWhat are adaptive peaks How do organisms move from one adaptive pea.pdf
What are adaptive peaks How do organisms move from one adaptive pea.pdf
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Explain SEAD, SAR and SPAAR routing protocols in more details.So.pdf

  • 1. Explain SEAD, SAR and SPAAR routing protocols in more details. Solution SEAD Protocols: SEAD is a proactive secure routing protocol based on DSDV-SQ-protocol. It does not rely on asymmetric encryption primitive but instead it relies on one-way hash chain for security. The algorithm expects that there is some authenticated and secure way to deliver the initial key KN. This could be done by key delivery in advance or by using public key encryption and signatures for key delivery. The basic idea of SEAD is, to authenticate the sequence number and metric of a routing table update message using hash chains elements. In addition, the receiver also authenticates the sender ensuring that the routing information originates from the correct node. The source of each routing update message in SEAD must also be authenticated since an attacker may be able to create routing loops through the impersonation attack. There are two different approaches proposed such as broadcast authentication mechanism, TESLA and Message Authentication Codes SAR routing protocols: SAR takes an approach to routing that incorporates security level of nodes into traditional routing metrics. In most protocols the length of the route is the only metric used. It does not target any protocol, but it rather provides security at a more generalized level of security. The goal is exposing security to the application and to the routing protocol. SAR uses AODV or DSR as a base protocol; it embeds the security metric into RREQ packet itself and changes the forwarding behavior of the protocol. When intermediate nodes receive an RREQ packet with a particular security metric or trust level, the node can only process the packet or forward it if it can provide the required security or trust level. SPAAR routing protocols: The SPAAR protocol was developed with the classical managed- hostile environment in mind, thus meant to provide a very high level of security, and sometimes at the cost of performance. Among other things, SPAAR also requires that each device to use a GPS locator to determine its position, although some leeway is given to nodes using a so-called “locator-proxy” if absolute security is not required. In SPAAR packets are only accepted between neighboring nodes one hop away from each other, this is to avoid the “invisible node- attack”. The basic transmission procedure is quite similar to ARAN, although the group neighborhood key is used for encryption in order to ensure one-hop communication only. Since all nodes also have information on their location they only forward RREQs if their position is closer to the destination position