Security Threats for the Optimized Link State Routing Protocol version 2 (OLSRv2)
draft-clausen-manet-olsrv2-sec-threats-01

Document Type Replaced Internet-Draft (manet WG)
Last updated 2015-10-14 (latest revision 2014-08-12)
Replaced by draft-ietf-manet-olsrv2-sec-threats
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream WG state Dead WG Document
Other - see Comment Log
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-manet-olsrv2-sec-threats
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-clausen-manet-olsrv2-sec-threats-01.txt

Abstract

This document analyzes common security threats of the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It then analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2, and how the vulnerabilities are mitigated.

Authors

Thomas Clausen (T.Clausen@computer.org)
Ulrich Herberg (ulrich@herberg.name)
Jiazi Yi (jiazi@jiaziyi.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)