A number of transaction protocols have been proposed in recent years for possible use of Wireless Networks in various application areas such as agriculture, medical, etc. In this paper we have presented wide-ranging review of these protocols with a particular focus on their transactions model. Further we have presented a comparison of some of the existing transactions based secured routing protocols of Wireless Networks. The base criteria for comparison is routing methodologies and the information used to make routing decisions. All the protocols have to meet different security attacks, with respect to which the analyses of secure versions of proposed protocols are discussed.
|