1 |
D. Dhillon, T. S. Randhawa, M. Wang, and L. Lamont, "Implementing a fully distributed certificate autorithy in an OLSRMANET," in Proc. IEEE WCNC, 2004.
|
2 |
D. Dhillon, J. Zhu, J. Richards, and T. Randhawa, "Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs," in Proc. IWCMC, 2006.
|
3 |
A. J. P. Vilela and J. Barros, "A cooperative security scheme for optimized link state routing in mobile ad-hoc networks," in Proc. IST MWCS, 2006.
|
4 |
A. Adnane, R. de Sousa, C. Bidan, and L. Me, "Analysis of the implicit trust within the OLSR protocol," in Proc. IFIP, 2007.
|
5 |
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A library for parallel simulation of large-scale wireless networks," in Proc. PADS, 1998.
|
6 |
D. Raffo, "Security schemes fo the OLSR protocol for ad hoc networks," Ph.D. dissertation, Univ. Paris, 2005
|
7 |
M. Mohanapriya and S. Urmila, "A novel technique for defending routing attacks in OLSR MANET," in Proc. IEEE ICCIC, 2010.
|
8 |
B. Kannhavong, H. Nakayama, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE trans. Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007.
DOI
ScienceOn
|
9 |
T. Clausen and P. Jacquet, "IETF RFC3626: Optimized link state routing protocol (OLSR)," Experimental, 2003.
|
10 |
T. Clausen and U.Herberg, "Security issues in the optimized link state routing protocol version 2 (OLSRv2)," Int. J. Netw. Security Appl., 2010.
|
11 |
B. Kannhavong, H. Nakayama and A. Jamalipour, "A study of routing attack in OLSR-based mobile ad hoc networks," Int. J. Commun. Syst., 2007.
|
12 |
B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, "Analysis of the node isolation attack against OLSR-based mobile ad hoc network," in Proc. ISCN, 2006, pp. 30-35.
|
13 |
D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Securing the OLSR protocol," in Proc. Med-Hoc-Net, 2003.
|
14 |
D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "An advanced signature system for OLSR," in Proc. ACM SASN, 2004.
|
15 |
D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Attacks against OLSR: Distributed key management for security," in Proc. OLSR Interop and Workshop, 2005.
|
16 |
C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network," HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, Feb. 2005.
|