Messages routed over paths whose nodes are
completely disjoint are completely protected against selective
forwarding attacks involving at most compromised Allowing
nodes to dynamically choose a packet‟s next hop probabilistically
from a set of possible candidates can further reduce the chances
of an adversary gaining complete control of a data flow