they occur because of theunreliability of the wireless medium may leadto transmission errors.
Link and node failures:
this may happen at anytime due to different types of hazardousconditions in the environment.
due to node/link failures or additions to the network or being based on anincorrect system state, routes may becomeobsolete.
Congested nodes or links:
due to the topologyof the network and the nature of the routing protocols, certain nodes or links may becomecongested, which will lead to higher delay or packet loss .
Regarding wireless network routing, each nodeforwards a packet to a single next hop. Therefore, if the transmission to that next hop fails, the node needsto retransmit the packet even though other neighborsmay have overheard it. In contrast, in any pathrouting, each node broadcasts a packet to multiplenext hops simultaneously and if the transmission toone neighbor fails, an alternative neighbor whoreceived the packet can forward it on .Our contribution in this paper is to present a newclassification for Secure Multipath Routing Protocolin WMNs as follow: Sections 2 which describes the properties of an ideal multipath routing protocol,section 3 which displays the secure multipath routing protocol and section 4 which presents
2. Properties of an Ideal MultipathRouting Protocol
Multipath routing is one of the distinguished featuresof wireless mesh networks in which a source devicecan establish a primary path as well as several backup paths toward a desired destination . This routingallows the use of several good paths to reachdestinations, not just the best path. This should beachieved without imposing excessive controloverhead in maintaining such
paths  which isshown in Figure 2. The main goal of multipathrouting is to construct multiple paths to enhance faulttolerance and decrease routing overheads . Theavailability of multiple paths between a source and adestination can be used to achieve the following benefits:
: introducing redundancy in thenetwork or providing backup routes which will be used when there is a failure, are forms of introducing fault tolerance at the routing level inmesh networks. Thus, some techniques may beapplied e.g. packet salvaging which consists of modifying the route of a packet if the actualroute is broken.
: Since in a meshnetwork, routing along a single path may not provide enough bandwidth for a connection,using simultaneously multiple paths to route datacan be a good approach to satisfy the bandwidthrequirement of some applications. By increasingthe throughput, a smaller end-to-end delay isachieved and quality of service is improved.
: as traffic distribution is not equalin all links in the network, spreading the trafficalong multiple routes can alleviate congestion insome links and bottlenecks.
: multipath protocols can be usedto provide error resilience by distributing traffic(for instance, using data and error correctioncodes) over multiple paths.
with single path routing protocols, it iseasy for an adversary to launch routing attacks, but multipath offers attack resilience .
Figure 2: Multipath routing wireless mesh network
Multipath routing is needed for securecommunication when route recovery cannot beguaranteed to be done fast enough because of thehigh mobility of the system. With standby paths,traffic can be redirected whenever we have routefailure, and reduce route recovery time. Multipathrouting also offers other quality of service advantages(such as, load balancing, aggregation of network bandwidth, reducing traffic congestion etc) .
These sections classify the routing multipath into twocategories: Secure routing multipath and insecurerouting multipath that are displayed in Figure 3.
3. Secure Multipath Routing Protocol
Wireless mesh networks are extremely vulnerable toattacks due to their dynamically changing topology,absence of conventional security infrastructures andopen medium of communication, which unlike their wired counterparts cannot be secured .The goalof the security protocols should be to ensure theconfidentiality, integrity, authenticity of network traffic and to preserve the availability of communications. Attacks intended to compromise