The exchange of topology information is a potential attack target in mobile ad-hoc networks. To provide an intrinsic security mechanism, it is possible to validate topology advertisements in the control plane against records of the path taken by transmission in the data plane. In this work, different path recording mechanisms are discussed. Their performance - in terms of packet overhead and reconstruction complexity - is analyzed and evaluated.
Identifer | oai:union.ndltd.org:UMASS/oai:scholarworks.umass.edu:theses-1290 |
Date | 01 January 2009 |
Creators | Chasaki, Danai |
Publisher | ScholarWorks@UMass Amherst |
Source Sets | University of Massachusetts, Amherst |
Detected Language | English |
Type | text |
Format | application/pdf |
Source | Masters Theses 1911 - February 2014 |
Page generated in 0.0364 seconds