Digital signatures for admittance control in the optimized link state routing protocol version 2

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Public community Mobile Ad Hoc NETworks (MANETs), such as the "Funkfeuer" or "Freifunk" networks, scale up to several hundreds of routers, connecting users with each other, and with the Internet. As MANETs are typically operated over wireless channels (e.g. WiFi), access to these networks is granted to anyone in the radio range of another router in the MANET, and running the same MANET routing protocol. In order to protect the stability of the networks from malicious intruders, it is important to ensure that only trusted peers are admitted to participate in the control message exchange, and to provide means for logically "disconnecting" a non-trustworthy peer. This paper presents the concept of admittance control for the Optimized Link State Routing Protocol version 2 (OLSRv2), and suggests a security extension based on digital signatures. Due to the flexible message format of OLSRv2, this extension keeps compatibility with the core OLSRv2 specification. Several standard digital signature algorithms (RSA, DSA, ECDSA), as well as HMAC, are compared in terms of message overhead and CPU time for generating and processing signatures.

Original languageEnglish
Title of host publicationInternational Conference on Internet Technology and Applications, ITAP 2010 - Proceedings
DOIs
Publication statusPublished - 27 Oct 2010
EventInternational Conference on Internet Technology and Applications, ITAP 2010 - Wuhan, China
Duration: 21 Aug 201023 Aug 2010

Publication series

NameInternational Conference on Internet Technology and Applications, ITAP 2010 - Proceedings

Conference

ConferenceInternational Conference on Internet Technology and Applications, ITAP 2010
Country/TerritoryChina
CityWuhan
Period21/08/1023/08/10

Fingerprint

Dive into the research topics of 'Digital signatures for admittance control in the optimized link state routing protocol version 2'. Together they form a unique fingerprint.

Cite this