Real-time protocol analysis for detecting link-state routing protocol attacks
نویسندگان
چکیده
منابع مشابه
Optimized Link State Routing Protocol for*Ad
In this paper we propose and discuss an optimized link state routing protocol, named OLSR, for mobile wireless networks. The protocol is based on the link state algorithm and it is proactive (or table-driven) in nature. It employs periodic exchange of messages to maintain topology information of the network at each node. OLSR is an optimization over a pure link state protocol as it compacts the...
متن کاملOptimized Link State Routing Protocol (OLSR)
This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN. The key concept used in the protocol is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the ooding process. This techniqu...
متن کاملSecure Link State Routing Protocol: A Framework
There are several security threats that are not addressed or partially addressed in current link state routing protocol. We propose a new framework for secure link state routing protocol based on two cryptographic countermeasures: informationlevel data origin authentication and information-level confidentiality. This new framework constructs multiple virtual trust routing domains (VTRD) to cons...
متن کاملA link-state QoS routing protocol for ad hoc networks
A Quality-of-Service (QoS) routing protocol is developed for mobile Ad Hoc Networks. We perform the proposed QoS-based routing in the Optimized Link State Routing (OLSR) protocol, introducing more appropriate metric than the hop distance. In our simulations the QoS routing protocol produces better performance comparing with the besteffort OLSR protocol.
متن کاملSecure Link State Routing Protocol: A Framework for Network Survivability
Network survivability has been studied extensively from the view of node and link failures. The domain of survivability goes beyond just the physical failures and one needs to address this issue when faced with security threats that can render the network logically dysfunctional without causing any physical damage. There are several security threats a network routing protocol such as the linkst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Information and System Security
سال: 2001
ISSN: 1094-9224,1557-7406
DOI: 10.1145/383775.383776