List of Tables

1.1 Constants for the Link Code field in a HELLO.
3.1 OLSR attacks and their effects on the network.
5.1 Elliptic curve parameters for global and local keys.
5.2 Benchmarks for operations on global and local keys (msec).
5.3 Protection offered from different OLSR attacks in absence of compromised nodes.
5.4 Comparison of message overhead for standard and secured OLSR.
6.1 Benchmarks for different ciphers (msec/op).
6.2 Signature length of different ciphers (bit).
8.1 Protection offered from different OLSR attacks in presence of compromised nodes.
9.1 Required proofs in an ADVSIG message.
11.1 Misbehaviors, in order of increasing severity.


Security Schemes for the OLSR Protocol for Ad Hoc Networks        Daniele Raffo        PhD Thesis, Université Paris 6       15 SEP 2005