Detailed specifications of a security architecture for OLSRReport as inadecuate




Detailed specifications of a security architecture for OLSR - Download this document for free, or read online. Document in PDF available to download.

1 HIPERCOM - High performance communication Inria Paris-Rocquencourt, UP11 - Université Paris-Sud - Paris 11, Inria Saclay - Ile de France, Polytechnique - X, CNRS - Centre National de la Recherche Scientifique : UMR

Abstract : In Mobile Ad Hoc Networks MANETs, mobile nodes use wireless devices to create spontaneously a larger network, larger than the one hop radio range, in which communication with each other is made possible by the means of routing. The goal of this document is the study of security issue related to integrity of an ad hoc network. We only consider ad hoc networks using the OLSR routing protocol. In a previous research report we have carried out a theoretical analysis of this issue. In this document we aim at precising a detailed security using the OLSR routing protocol. We also validate this This security architecture at the CELAR.

Keywords : CONNECTIVITY SIGNATURE TIME-STAMPS REPLAY AD HOC NETWORK ATTACKS ROUTING PROTOCOL





Author: Cédric Adjih - Paul Muhlethaler - Daniele Raffo -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents