Impementing and extending the Optimized Link State Routing Protocol

A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing(OLSR) protocol is a route management protocol for such mobile ad hoc networks. This study presents the work of implementing the OLSR routing protocol. The implementation is done in a modular fashion, allowing for the use of external plugins. Also, this study analyzes certain extensions to the protocol done in relation to the implementation, including Internet connectivity, security and auto-configuration. More technical implementation designs are also covered.

[1]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[2]  Ravi Prakash,et al.  MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[3]  Charles E. Perkins,et al.  Internet Connectivity for Ad Hoc Mobile Networks , 2002, Int. J. Wirel. Inf. Networks.

[4]  Kevin C. Almeroth,et al.  A mobility gateway for small-device networks , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[5]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[6]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[7]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .

[8]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[9]  André Schiper,et al.  On the accuracy of MANET simulators , 2002, POMC '02.

[10]  Liang Cheng,et al.  Service Advertisement and Discovery in Mobile Ad hoc Networks , 2002 .

[11]  Charles Hornig A Standard for the Transmission of IP Datagrams over Ethernet Networks , 1984, RFC.

[12]  Kwan-Wu Chin,et al.  Implementation experience with MANET routing protocols , 2002, CCRV.

[13]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[14]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[15]  Philippe Jacquet,et al.  Performance of Multipoint Relaying in Ad Hoc Mobile Routing Protocols , 2002, NETWORKING.

[16]  Laurent Viennot,et al.  Complexity Results on Election of Multipoint Relays in Wireless Networks , 1998 .

[17]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .

[18]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[19]  Anis Laouiti,et al.  Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .

[20]  Philippe Jacquet,et al.  Performance analysis of olsr multipoint relay flooding in two ad hoc wireless network models , 2001 .

[21]  Gruia-Catalin Roman,et al.  Service Provision in Ad Hoc Networks , 2002, COORDINATION.