作者
Danai Chasaki, Y Sinan Hanay, Tilman Wolf
发表日期
2008/11/16
研讨会论文
MILCOM 2008-2008 IEEE Military Communications Conference
页码范围
1-7
出版商
IEEE
简介
The exchange of topology information is a potential attack target in mobile ad-hoc networks. To provide an intrinsic security mechanism, it is possible to validate topology advertisements in the control plane against records of the path taken by transmission in the data plane. In this context, we provide a discussion of different path recording mechanisms. We evaluate their performance in terms of packet overhead and reconstruction complexity.
引用总数
2009201020112012201320142015241
学术搜索中的文章
D Chasaki, YS Hanay, T Wolf - MILCOM 2008-2008 IEEE Military Communications …, 2008