How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Jury: Mme Ana Cavalli, M. François Baccelli, M. François Morain, M. Paul Mühlethaler, M. Guy Pujolle, M. Ahmed Serhrouchni
In this paper we examine security issues related to the Optimized Link State Routing protocol, a proactive routing protocol for MANETs. We enumerate a number of possible attacks against the integrity of the OLSR routing infrastructure, and present a technique for securing the network. In particular, we concentrate on the remaining attacks when a me...
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create spontaneously a larger network, larger than radio range, in which communication with each other is made possible by the means of routing. One routing protocol for such MANET networks is OLSR, on which this article focuses. We examine the security issues, and describe an...
The primary issue with respect to securing Mobile Ad hoc NETworks (MANETs) is that of ensuring network integrity even when the network is subject to attacks to break its connectivity. In this research report, we study how to secure the OLSR routing protocol . We first analyse the attacks that can be launched against the network integrity. We then p...
In this paper we investigate security issues related to the Optimized Link State Routing Protocol -- one example of a proactive routing protocol for MANETs. We inventory the possible attacks against the integrity of the OLSR network routing infrastructure, and present a technique for securing the network. In particular, assuming that a mechanism fo...
In this paper, we examine security issues related to proactive routing protocols for MANETs. Specifically, we investigate secu-rity properties of the Optimized Link-State Routing Protocol -one example of a proactive routing protocol for MANETs. We investi-gate the possible attacks against the integrity of the network rout-ing infrastructure, and pr...