T. Clausen, C. Dearlove, and B. Adamson, RFC5148: Jitter Considerations in Mobile Ad Hoc Networks (MANETs), Informational

T. Clausen, C. Dearlove, J. Dean, and C. Adjih, RFC5444: Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format, Std. Track

T. Clausen and C. Dearlove, RFC5497: Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs), Std. Track

T. Clausen, C. Dearlove, and J. Dean, I-D: MANET Neighborhood Discovery Protocol (NHDP), Work In Progress

T. Clausen, C. Dearlove, and P. Jaquet, I-D: The Optimized Link State Routing Protocol version 2 (OLSRv2), Work In Progress

T. Clausen and P. Jacquet, RFC3626: Optimized Link State Routing Protocol (OLSR)

C. Hutzler, D. Crocker, P. Resnick, E. Allman, and T. Finch, Email Submission Operations: Access and Accountability Requirements, Best Current Practice
DOI : 10.17487/rfc5068

A. Qayyum, L. Viennot, and A. Laouiti, Multipoint relaying: An efficient technique for flooding in mobile wireless networks, 35th Annual Hawaii International Conference on System Sciences, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00072756

Y. Li, C. Wang, W. Zhao, and X. You, The Jamming problem in IEEE 802.11-based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement, International Journal of Communication Systems, vol.10, issue.8, pp.937-958, 2009.
DOI : 10.1002/dac.1007

C. Adjih, E. Baccelli, T. Clausen, P. Jacquet, and G. Rodolakis, Fish eye OLSR scaling properties, Special Issue on Mobile Ad Hoc Wireless Networks, 2004.
DOI : 10.1109/JCN.2004.6596835

URL : https://hal.archives-ouvertes.fr/hal-00654544

L. Viennot, Complexity results on election of multipoint relays in wireless networks, INRIA, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00073097

U. Herberg, Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2, 2010 8th Annual Communication Networks and Services Research Conference, 2010.
DOI : 10.1109/CNSR.2010.12

URL : https://hal.archives-ouvertes.fr/inria-00446110

T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation through Experiments and Simulation, Proceedings of the IEEE conference on Wireless Personal Multimedia Communications (WPMC), pp.800-57, 2001.

D. Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), Informational
DOI : 10.17487/rfc3174

B. Kaliski and J. Staddon, PKCS 1: RSA Cryptography Specifications Version 2.019] National Institute of Standards & Technology, Digital Signature Standard, pp.186-189, 2009.

D. Johnson, A. Menezes, and S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, pp.36-63, 2001.
DOI : 10.1007/s102070100002

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Informational
DOI : 10.17487/rfc2104

U. Herberg, JOLSRv2 ? An OLSRv2 implementation in Java, Proceedings of the 4th OLSR Interop workshop, 2008.

U. Herberg, Integrating Java Support for Routing Protocols in Ns2, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00428521

G. J. Pottie and W. J. Kaiser, Wireless integrated network sensors, Communications of the ACM, vol.43, issue.5, pp.51-58, 2000.
DOI : 10.1145/332833.332838

M. Timing and A. , 12 3.4.1 Interval Time Attack, Validity Time Attack, p.12

.. Identity-spoofing, 15 4.1.1 Inconsistent Topology Maps due to Neighborhood Discovery 16 4.1.2 Inconsistent Topology Maps due to Link State Advertisements, p.17

L. Spoofing and .. , 19 4.2.1 Inconsistent Topology Maps due to Neighborhood Discovery 19 4.2.2 Inconsistent Topology Maps due to Link State Advertisements