2. Plan
• What is SAR protocol?
• Advantages
• Disadvantages
• Conclusion
11/7/2017 2/8
3. What is SAR protocol?
• On demand routing protocol (Reactive)
• The initiator of the route includes a security metric in the route
request
• This security metric is the minimum trust level of the nodes that
can participate in the route discovery.
11/7/2017 3/8
4. What is SAR protocol?
• Only those nodes that have this minimum security level can
participate in the route discovery.
• All other nodes that are below that trust level will drop the
request packets.
11/7/2017 4/8
5. What is SAR protocol?
Property Techniques
Timeliness Timestamp
Ordering Sequence Number
Authenticity Password, Certificate
Authorization Credential
Integrity Digest, Digital Signature
Confidentiality Encryption
Non-Repudiation Chaining of Digital Signatures
SAR properties and techniques that can be implemented
11/7/2017 5/8
6. Advantages
• Prevent attacks such as: replay, interception, modification and
fabrication
• Allow applications to selectively implement a subset of
security services
11/7/2017 6/8
7. Disadvantages
• Delay
• Header Size
• The routes discovered may not always be the shortest one
• SAR may fail to find the route (even if it exists)
11/7/2017 7/8
8. Conclusion
• SAR is an one demand routing protocol
• Insure data integrity, confidentiality, non-repudiation and
other security goals
• Serious disadvantages such as delay time and header size
11/7/2017 8/8