The proactive optimized link state routing (OLSR) protocol for mobile
wireless ad hoc networks has no default security services. Three
different schemes have been proposed to protect the protocol. Even
though equal with regard to provided security services, the impact
on resource consumption diverge significantly due to the design choices.
This paper investigates and analyzes the recommended mechanisms with
regard to bandwidth consumption and delay. Mechanisms evaluated are
the utilization of separate signature messages versus directly signed
routing messages, routing message aggregation as a possible way of
reducing bandwidth consumption, times tamps versus sequence numbers
as the basis for replay protection and periodical versus on-demand
exchange of time information
%0 Conference Paper
%1 Winjum05
%A Winjum, E.
%A Hegland, A.M.
%A Spilling, P.
%A Kure, O.
%B Military Communications Conference, 2005. MILCOM 2005. IEEE
%D 2005
%K bandwidth_allocation bandwidth_consumption delay digital_signatures mobile_wireless_ad_hoc_network optimized_link_state_routing performance_evaluation resource_allocation resource_consumption routing_message security_scheme signature_message protocol ad-hoc network mobile radio security telecommunication OLSR proactive
%P 2307 -2313 Vol. 4
%R 10.1109/MILCOM.2005.1606013
%T A performance evaluation of security schemes proposed for the OLSR
protocol
%X The proactive optimized link state routing (OLSR) protocol for mobile
wireless ad hoc networks has no default security services. Three
different schemes have been proposed to protect the protocol. Even
though equal with regard to provided security services, the impact
on resource consumption diverge significantly due to the design choices.
This paper investigates and analyzes the recommended mechanisms with
regard to bandwidth consumption and delay. Mechanisms evaluated are
the utilization of separate signature messages versus directly signed
routing messages, routing message aggregation as a possible way of
reducing bandwidth consumption, times tamps versus sequence numbers
as the basis for replay protection and periodical versus on-demand
exchange of time information
@inproceedings{Winjum05,
abstract = {The proactive optimized link state routing (OLSR) protocol for mobile
wireless ad hoc networks has no default security services. Three
different schemes have been proposed to protect the protocol. Even
though equal with regard to provided security services, the impact
on resource consumption diverge significantly due to the design choices.
This paper investigates and analyzes the recommended mechanisms with
regard to bandwidth consumption and delay. Mechanisms evaluated are
the utilization of separate signature messages versus directly signed
routing messages, routing message aggregation as a possible way of
reducing bandwidth consumption, times tamps versus sequence numbers
as the basis for replay protection and periodical versus on-demand
exchange of time information},
added-at = {2011-07-15T15:18:02.000+0200},
author = {Winjum, E. and Hegland, A.M. and Spilling, P. and Kure, O.},
biburl = {https://www.bibsonomy.org/bibtex/215c4100afd738333b7995d8cb2e8ed8a/msteele},
booktitle = {Military Communications Conference, 2005. MILCOM 2005. IEEE},
doi = {10.1109/MILCOM.2005.1606013},
interhash = {596b7dcd556b8ae60f1295f79e741b94},
intrahash = {15c4100afd738333b7995d8cb2e8ed8a},
keywords = {bandwidth_allocation bandwidth_consumption delay digital_signatures mobile_wireless_ad_hoc_network optimized_link_state_routing performance_evaluation resource_allocation resource_consumption routing_message security_scheme signature_message protocol ad-hoc network mobile radio security telecommunication OLSR proactive},
month = oct,
owner = {msteele},
pages = {2307 -2313 Vol. 4},
review = {Discusses overhead introduced by securing the OLSR protocol. The interesting
read of this paper should be the proposals on secuing OLSR.},
timestamp = {2011-07-15T20:00:07.000+0200},
title = {{A performance evaluation of security schemes proposed for the OLSR
protocol}},
year = 2005
}