Skip to main content

Security Threats for the Optimized Link State Routing Protocol version 2 (OLSRv2)
draft-clausen-manet-olsrv2-sec-threats-01

Document Type Replaced Internet-Draft (manet WG)
Expired & archived
Authors Thomas H. Clausen , Ulrich Herberg , Jiazi Yi
Last updated 2015-10-14 (Latest revision 2014-08-12)
Replaced by draft-ietf-manet-olsrv2-sec-threats
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Dead WG Document
Other - see Comment Log
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-manet-olsrv2-sec-threats
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document analyzes common security threats of the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It then analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2, and how the vulnerabilities are mitigated.

Authors

Thomas H. Clausen
Ulrich Herberg
Jiazi Yi

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)