RFC5148: Jitter Considerations in Mobile Ad Hoc Networks (MANETs), Informational ,
RFC5444: Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format, Std. Track ,
RFC5497: Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs), Std. Track ,
I-D: MANET Neighborhood Discovery Protocol (NHDP), Work In Progress ,
I-D: The Optimized Link State Routing Protocol version 2 (OLSRv2), Work In Progress ,
RFC3626: Optimized Link State Routing Protocol (OLSR) ,
Email Submission Operations: Access and Accountability Requirements, Best Current Practice ,
DOI : 10.17487/rfc5068
Multipoint relaying: An efficient technique for flooding in mobile wireless networks, 35th Annual Hawaii International Conference on System Sciences, 2001. ,
URL : https://hal.archives-ouvertes.fr/inria-00072756
The Jamming problem in IEEE 802.11-based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement, International Journal of Communication Systems, vol.10, issue.8, pp.937-958, 2009. ,
DOI : 10.1002/dac.1007
Fish eye OLSR scaling properties, Special Issue on Mobile Ad Hoc Wireless Networks, 2004. ,
DOI : 10.1109/JCN.2004.6596835
URL : https://hal.archives-ouvertes.fr/hal-00654544
Complexity results on election of multipoint relays in wireless networks, INRIA, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00073097
Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2, 2010 8th Annual Communication Networks and Services Research Conference, 2010. ,
DOI : 10.1109/CNSR.2010.12
URL : https://hal.archives-ouvertes.fr/inria-00446110
The Optimized Link State Routing Protocol, Evaluation through Experiments and Simulation, Proceedings of the IEEE conference on Wireless Personal Multimedia Communications (WPMC), pp.800-57, 2001. ,
US Secure Hash Algorithm 1 (SHA1), Informational ,
DOI : 10.17487/rfc3174
PKCS 1: RSA Cryptography Specifications Version 2.019] National Institute of Standards & Technology, Digital Signature Standard, pp.186-189, 2009. ,
The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, pp.36-63, 2001. ,
DOI : 10.1007/s102070100002
HMAC: Keyed-Hashing for Message Authentication, Informational ,
DOI : 10.17487/rfc2104
JOLSRv2 ? An OLSRv2 implementation in Java, Proceedings of the 4th OLSR Interop workshop, 2008. ,
Integrating Java Support for Routing Protocols in Ns2, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00428521
Wireless integrated network sensors, Communications of the ACM, vol.43, issue.5, pp.51-58, 2000. ,
DOI : 10.1145/332833.332838
12 3.4.1 Interval Time Attack, Validity Time Attack, p.12 ,
15 4.1.1 Inconsistent Topology Maps due to Neighborhood Discovery 16 4.1.2 Inconsistent Topology Maps due to Link State Advertisements, p.17 ,
19 4.2.1 Inconsistent Topology Maps due to Neighborhood Discovery 19 4.2.2 Inconsistent Topology Maps due to Link State Advertisements ,