MILCOM 2005 - 2005 IEEE Military Communications Conference
DOI: 10.1109/milcom.2005.1606013
|View full text |Cite
|
Sign up to set email alerts
|

A Performance Evaluation of Security Schemes Proposed for the OLSR Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…In a practical situation it can be hard to decide which nodes are most likely to be compromised. Furthermore, in ad hoc networks, the number of messages may be more devastating than the size of the messages [64]. Hence, the actual gain of the proposed refinements is not evident.…”
Section: =S(nx)+k In Order To Extract the Key The Nodes Must Firstmentioning
confidence: 99%
“…In a practical situation it can be hard to decide which nodes are most likely to be compromised. Furthermore, in ad hoc networks, the number of messages may be more devastating than the size of the messages [64]. Hence, the actual gain of the proposed refinements is not evident.…”
Section: =S(nx)+k In Order To Extract the Key The Nodes Must Firstmentioning
confidence: 99%
“…→ T C RELAY (n1, m) (10) The relation (10) describes the message integrity property: the node ns announces a TC message m; when receiving the message m, MPR node n1 (respectively n2..., nk) makes a copy m (respectively m , ..., mk) of the message m and forwards it to the other neighbors. The content of message m must not be modified.…”
Section: T C(ns N1 M) ∧ Mp R Neighbor(ns N1)mentioning
confidence: 99%
“…According to the specifications in [4] signatures should also be distributed in separate messages. But, in [23] it is shown that end-to-end signatures in separate messages scale badly. And backward compatibility may not be important in operational scenarios such as emergency and rescue operations where only pre-defined nodes are allowed to join.…”
Section: Olsrmentioning
confidence: 99%
“…Standard OLSR is included for reference. Topology information and calculation methods are adopted from [23], and were obtained through calculations and simulations with the ns-2 network simulator. The calculations assume IEEE 802.11b with CSMA/CS-DSSS for the lower layers, and OLSR traffic broadcast data rate of 1Mbps.…”
Section: ) Overheadmentioning
confidence: 99%