Diseño de un modelo de autenticación para fortalecer la seguridad a nivel de enrutamiento del protocolo OLSR en una MANET
dc.contributor.author | Díaz Jiménez, Femny Javier | |
dc.contributor.author | Palacio Velásquez, José Gregorio | |
dc.date.accessioned | 2019-10-23T14:27:09Z | |
dc.date.available | 2019-10-23T14:27:09Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Las MANET (Mobile Adhoc Network) son redes sin infraestructura formadas por dispositivos móviles, estas redes se generan de forma espontánea, cuando los nodos, los cuales por lo general se encuentran en movimiento constante, se encuentran en el rango de distancia adecuado para poder unirse a la red, esta característica hace que la topología de la red sea muy variable y por lo tanto se requiere de algoritmos de enrutamiento que se adapten a dichos cambios, uno de estos algoritmos es el OLSR. Uno de los problemas a los que se enfrentan estas redes, es el hecho de, que debido a sus características específicas, se vuelve un poco complicada la implementación de seguridad, ya que es muy difícil controlar la conexión de nodos maliciosos, debido al dinamismo de la misma. Teniendo en cuenta que en este tipo de redes cualquier nodo puede funcionar como enrutador para los otros nodos, es posible que un nodo malicioso, que se encuentre conectado a la MANET, intente inyectar tablas de enrutamiento falsificadas al resto de nodos, lo que afectaría el funcionamiento de la red. La finalidad de este proyecto es definir un mecanismo que permita asegurar dichas tablas de enrutamiento, a través de una técnica de autenticación. Para dar solución a este problema, se realizó un diseño dividido en cuatro fases, la primera fase aborda el detalle de la conexión y autenticación del nodo, para lo cual se decidió por el uso de firma digital basada en algoritmos de cifrado asimétrico, para lo cual el nodo durante su fase de conexión a la red, le envíe su llave pública a todos sus vecinos, en la fase dos, se basa en un sistema de reputación, en el cual un nodo calcula la reputación de los diferentes nodos con los que ha tenido comunicación, definiendo si el mismo tiene mala o buena reputación, y generando un TLV de reputación, el cual es enviado al resto de nodos y calculando la misma según el esquema planteado basado en el Algoritmo de los generales bizantinos. La tercera fase se basa en la selección del nodo MPR, basado en la voluntad del mismo para convertirse en MPR y el cálculo de la reputación realizado en la fase 2. Como última fase, para implementar autenticación y validar la integridad de las tablas de enrutamiento, se hará uso de la firma digital, basada en el hash del mensaje, del nodo junto con la tabla de enrutamiento. Este diseño pretende disminuir en gran medida, no solo la conexión de nodos maliciosos a la red, sino que dado el caso, un nodo malicioso llegara a conectarse y se presentará pérdida de paquetes debido al mismo, el nodo terminaría siendo aislado de la red, ya que nunca haría parte del enrutamiento de paquetes, por su mala reputación. El alcance de este proyecto llega hasta el diseño de la solución, la cual se basa en una combinación de técnicas que han demostrado ser eficientes en este tipo de redes, a futuro se podría trabajar en la implementación de la solución para medir su efectividad, y buscar algún otro mecanismo de medición de reputación para compararlo con el propuesto. | spa |
dc.description.abstract | The MANET (Mobile Adhoc Network) are networks without infrastructure formed by mobile devices, these networks are generated spontaneously, when the nodes, which are usually in constant movement, are in the right distance range to be able to join to the network, this feature makes the topology of the network very variable and therefore requires routing algorithms that adapt to these changes, one of these algorithms is the OLSR. One of the problems faced by these networks is the fact that due to their specific characteristics, the implementation of security becomes a bit complicated, since it is very difficult to control the connection of malicious nodes, due to the dynamism of the same. Taking into account that in this type of networks any node can function as a router for the other nodes, it is possible that a malicious node, which is connected to the MANET, tries to inject falsified routing tables to the rest of the nodes, which would affect the operation of the network. The purpose of this project is to define a mechanism to ensure these routing tables, through an authentication technique. To solve this problem, a design was divided into four phases, the first phase addresses the detail of the connection and authentication of the node, for which it was decided to use a digital signature based on asymmetric encryption algorithms, specifically RSA , for which the node during its phase of connection to the network, sends its public key to all its neighbors, in phase two, it is based on a reputation system, in which a node calculates the reputation of the different nodes with which it has had communication, defining if it has bad or good reputation, and generating a TLV of reputation, which is sent to the rest of the nodes and calculating the same according to the proposed scheme based on the Algorithm of the Byzantine generals. The third phase is based on the selection of the MPR node, based on the will of the same to become MPR and the calculation of the reputation performed in phase 2. As a last phase, to implement authentication and validate the integrity of the routing tables, use will be made of the digital signature, based on the hash of the message, of the node together with the routing table. This design aims to reduce to a large extent, not only the connection of malicious nodes to the network, but if necessary, a malicious node will connect and there will be packet loss due to it, the node would end up being isolated from the network, since it would never be part of packet routing, because of its bad reputation. The scope of this project goes to the design of the solution, which is based on a combination of techniques that have proven to be efficient in this type of networks, in the future we could work on the implementation of the solution to measure its effectiveness, and look for some other mechanism of reputation measurement to compare it with the proposed one. | eng |
dc.identifier.uri | https://hdl.handle.net/20.500.12442/4216 | |
dc.language.iso | spa | spa |
dc.publisher | Ediciones Universidad Simón Bolívar | spa |
dc.publisher | Facultad de Ingenierías | spa |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | eng |
dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | spa |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.source.bibliographicCitation | Advanced Network Technologies Division Wireless Ad Hoc Network (s.f.) Recuperado 14 de julio de 2016, de http://www.antd.nist.gov/wahn_mahn.shtml. | eng |
dc.source.bibliographicCitation | Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT - New method for resisting network layer denial of service attack on MANET. Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT, 2016, 762–766. https://doi.org/10.1109/CSNT.2014.160 | eng |
dc.source.bibliographicCitation | Ahmad, M., Chen, Q., Najam-Ul-Islam, M., Iqbal, M. A., & Hussain, S. (2018). On the secure optimized link state routing (SOLSR) protocol for MANETs. Proceedings of the 2017 12th International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2017, 2018-Janua, 1–8. https://doi.org/10.1109/ISKE.2017.8258757 | eng |
dc.source.bibliographicCitation | Ahmed, A., Abu Bakar, K., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9(2), 280–296. https://doi.org/10.1007/s11704-014-4212-5 | eng |
dc.source.bibliographicCitation | Álvarez, S., & Rios, M. (2013). Estudio Comparativo de las Soluciones Frente al Ataque Wormhole dentro de una MANET. Universidad SImón Bolívar. | spa |
dc.source.bibliographicCitation | Amraoui, H., Habbani, A., Hajami, A., & Bilal, E. (2016). Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model. Mobile Information Systems, 2016. https://doi.org/10.1155/2016/5653010 | eng |
dc.source.bibliographicCitation | Aneiba, A., & Melad, M. (2016). Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. International Journal of Future Computer and Communication. https://doi.org/10.18178/ijfcc.2016.5.1.444 | eng |
dc.source.bibliographicCitation | Bhuvaneswari, R., & Ramachandran, R. (2018a). Comparative Analysis of E-OLSR Algorithm in the Presence of Routing Attacks in MANET. International Journal of Sensors, Wireless Communications and Control, 8(1), 65–71. https://doi.org/10.2174/2210327908666180328163219 | eng |
dc.source.bibliographicCitation | Bhuvaneswari, R., & Ramachandran, R. (2018b). Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing, 1–11. https://doi.org/10.1007/s10586-018-1723-0 | eng |
dc.source.bibliographicCitation | Chang, J., Tsou, P., Woungang, I., Chao, H., & Lai, C. (2014). Defending Against Collaborative Attacks by Malicious Nodes in MANETs : A Cooperative Bait Detection Approach. IEEE Systems Journal, 9(1), 65–75. https://doi.org/10.1109/JSYST.2013.2296197 | eng |
dc.source.bibliographicCitation | Chiejina, E., Xiao, H., & Christianson, B. (2015). A dynamic reputation management system for mobile ad hoc networks. 6th Computer Science and Electronic Engineering Conference, CEEC 2014 - Conference Proceedings, 133–138. https://doi.org/10.1109/CEEC.2014.6958568 | eng |
dc.source.bibliographicCitation | Chowdari, R., & Srinivas, K. (2017). A Survey on Detection of Blackhole and Grayhole Attacks in Mobile Ad-hoc Networks. International Research Journal of Engineering and Technology (IRJET), 4(5), 1375–1378. https://doi.org/10.15680/IJIRCCE.2017. | eng |
dc.source.bibliographicCitation | Clausen, T., Dean, J., & Adjih, C. (2009). RFC 5444 - Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. Internet Engineering Task Force (IETF). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC5444 | eng |
dc.source.bibliographicCitation | Clausen, T., & Dearlove, C. (2009). RFC 5497 - Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC5497 | eng |
dc.source.bibliographicCitation | Clausen, T., Dearlove, C., & Adamson, B. (2008). RFC 5148 - Jitter Considerations in Mobile Ad Hoc Networks. Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC5148 | eng |
dc.source.bibliographicCitation | Clausen, T., Dearlove, C., & Dean, J. (2011). RFC 6130 - Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). Internet Engineering Task Force (IETF). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC6130 | eng |
dc.source.bibliographicCitation | Clausen, T., Dearlove, C., Jacquet, P., & Herberg, U. (2014). RFC 7181 - The Optimized Link State Routing Protocol Version 2. Internet Engineering Task Force (IETF). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC7181 | eng |
dc.source.bibliographicCitation | Clausen, T., Herberg, U., & Yi, J. (2017). RFC 8116 - Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC8116 | eng |
dc.source.bibliographicCitation | Clausen, T., & Jacquet, P. (2003). RFC 3626 - Optimized Link State Routing Protocol (OLSR). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC3626 | eng |
dc.source.bibliographicCitation | Dearlove, C., & Clausen, T. (2014). RFC 7188 - Optimized Link State Routing Protocol Version 2 (OLSRv2) and MANET Neighborhood Discovery Protocol (NHDP) Extension TLVs. Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC7188 | eng |
dc.source.bibliographicCitation | Dearlove, C., & Clausen, T. (2015). RFC 7631 - TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format. Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC7631 | eng |
dc.source.bibliographicCitation | Echchaachoui, A., Choukri, A., Habbani, A., & Elkoutbi, M. (2014). Asymmetric and dynamic encryption for routing security in MANETs. International Conference on Multimedia Computing and Systems -Proceedings, 0, 825–830. https://doi.org/10.1109/ICMCS.2014.6911237 | eng |
dc.source.bibliographicCitation | Fernández-Bravo Peñuela, Francisco Javier; Bernabeu Aubán, J. M. (2018). Consenso Bizantino y Blockchain. Retrieved from https://riunet.upv.es/handle/10251/115369 | eng |
dc.source.bibliographicCitation | Gadekar, M. S. (2017). Secure Optimized Link State Routing ( OLSR ) Protocol A gainst Node Isolation Attack. 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 684–687. | eng |
dc.source.bibliographicCitation | Gharib, H., & Belloulata, K. (2014). AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY, 8(22), 12–18. https://doi.org/10.12913/22998624.1105141 | eng |
dc.source.bibliographicCitation | Godwin, J., & Srinivasan, R. (2014). A Survey on MANET Security Challenges,, Attacks and its Countermeasures. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3(1), 274–279. | eng |
dc.source.bibliographicCitation | Herberg, U. (Fujitsu L. of A., Clausen, T. (LIX, E. P., & Dearlove, C. (BAE S. A. (2014). RFC 7182 - Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). Internet Engineering Task Force (IETF). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC7182 | eng |
dc.source.bibliographicCitation | Herberg, U. (Fujitsu L. of A., Dearlove, C. (BAE S. A., & Clausen, T. (LIX, E. P. (2014). RFC 7183 - Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2). Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC7183 | eng |
dc.source.bibliographicCitation | Honarbakhsh, S., Latif, L. B. A., Manaf, A. B. A., & Emami, B. (2014). Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography. International Journal of Computer and Communication Engineering, 3(1), 41–45. https://doi.org/10.7763/IJCCE.2014.V3.289 | eng |
dc.source.bibliographicCitation | Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks. IEEE Transactions on Mobile Computing, 16(10), 2927–2940. https://doi.org/10.1109/TMC.2017.2649527 | eng |
dc.source.bibliographicCitation | James, J. L., & Thomas, B. (2016). A Study on Preventing Node Isolation Attack in OLSR Protocol. Procedia Technology, 25(Raerest), 349–355. https://doi.org/10.1016/j.protcy.2016.08.117 | eng |
dc.source.bibliographicCitation | Jaramillo, S. (2010). Servicios de Autenticación y Modelo de Seguridad en Redes Móviles Ad Hoc. La Universidad Católica de Loja. | spa |
dc.source.bibliographicCitation | Jubair, M. A., Khaleefah, S. H., Budiyono, A., Mostafa, S. A., & Mustapha, A. (2018). Performance Evaluation of AODV and OLSR Routing Protocols in MANET Environment, 8(4), 1277–1283. | eng |
dc.source.bibliographicCitation | Kaur, N., Joshi, M., & Nagar, Y. (2014). Implementing MANET Security using CBDS for Combating Sleep Deprivation & DOS Attack, 16(1), 6–11. | eng |
dc.source.bibliographicCitation | Kumar, Amit, & Singla, V. (2016). Detecting and Avoiding Sybil Attack in OLSR Protocol. International Journal of Control Theory and Applications, 5(5), 1905–1910. | eng |
dc.source.bibliographicCitation | Kumar, Ashish, Tokekar, V., & Shrivastava, S. (2016). Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks. Information and Communication Technology, Proceeding of ICICT 2016, 625, 3–5. https://doi.org/10.1007/978-981-10-5508-9_4 | eng |
dc.source.bibliographicCitation | Kumar Jha, R., & Kharga, P. (2015). A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator. International Journal of Computer Network and Information Security. https://doi.org/10.5815/ijcnis.2015.04.08 | eng |
dc.source.bibliographicCitation | Kumar, N., & Tripathi, K. (2017). Analysis of Black Hole Attack in MANET Based on Simulation through NS3.26, 5(5), 194–205. | eng |
dc.source.bibliographicCitation | Litvinov, G. A. (2018). Applying Static Mobility Model in Relaying Network Organization in Mini-UAVs Based FANET. 2018Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), 1–7. | eng |
dc.source.bibliographicCitation | Mishra, R., Kaur, I., & Sharma, S. (2010). New trust based security method for mobile ad-hoc networks Sanjeev sharma widely used in military and other scientific areas with nodes which can move. International Journal of Computer Science and Security, 4(3), 346–351. | eng |
dc.source.bibliographicCitation | Mohit, M., & Pal, S. (2015). Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks. International Journal of Computer Science and Information Technologies, 6(6), 5121–5125. | eng |
dc.source.bibliographicCitation | Najafpour, B., Mahdavi, B., Soleimani, P., & Rahmani, R. (2016). Optimizing Security Issue Of OLSR Routing Protocol Based On Trust Method in Wireless Sensor Networks. International Journal of Research in Computer Applications and Robotics, 4(3), 27–37. | eng |
dc.source.bibliographicCitation | Narten, T., & Alvestrand, H. (2008). RFC 5226 - Guidelines for Writing an IANA Considerations Section in RFCs. Internet Engineering Task Force (IETF). https://doi.org/10.17487/RFC5226 | eng |
dc.source.bibliographicCitation | Patil, G. M., Kumar, A., & Shaligram, A. D. (n.d.). Performance Comparison of MANET Routing Protocols (OLSR, AODV, DSR, GRP and TORA) Considering Different Network Area Size. International Journal of Engineering and Management Research, (3). Retrieved from www.ijemr.net | eng |
dc.source.bibliographicCitation | Pérez-Solà, C., & Herrera-Joancomartí, J. (2014). Bitcoin y el problema de los generales bizantinos. Actas de La XIII Reunión Española de Criptología y Seguridad de La Información (RECSI 2014), 241–246. Retrieved from http://hdl.handle.net/10045/40444 | spa |
dc.source.bibliographicCitation | Pouyan, A., & Yadollahzabeh, M. (2015). FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. International Journal of Communication Systems, 31(2), 361–386. https://doi.org/10.1002/dac | eng |
dc.source.bibliographicCitation | Rajaram, A., & Palaniswami, S. (2010). Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol. International Journal of Computer Science Ans Information Technologies, 1(2), 130–137. | eng |
dc.source.bibliographicCitation | Rani, V. I., & Reddy, K. T. (2017). To Improve The Security Of OLSR Routing Protocol Based On Local Detection Of Link Spoofing, 5(6), 652–655. | eng |
dc.source.bibliographicCitation | Raza, N., Umar Aftab, M., Qasim Akbar, M., Ashraf, O., & Irfan, M. (2016). Mobile Ad-Hoc Networks Applications and Its Challenges. Communications and Network, 08(03), 131–136. https://doi.org/10.4236/cn.2016.83013 | eng |
dc.source.bibliographicCitation | Rocabado, S. (2013). Caso de estudio de comunicaciones seguras sobre redes móviles Ad Hoc. Universidad Nacional de la Plata. https://doi.org/10.13140/RG.2.1.3336.4963 | spa |
dc.source.bibliographicCitation | Sallam, G., & Mahmoud, A. (2015). Performance Evaluation of OLSR and AODV in VANET Cloud Computing Using Fading Model with SUMO and NS3. 2015 International Conference on Cloud Computing, ICCC 2015, 1–5. https://doi.org/10.1109/CLOUDCOMP.2015.7149649 | eng |
dc.source.bibliographicCitation | Samreen, A., & Hyderv, S. I. (2015). Role of Threshold Cryptography in Securing MANETs, 15(1), 106–112. | eng |
dc.source.bibliographicCitation | Santiago, E. (2005). Posibilidades de las MANET (Mobile Ad-Hoc Networks ) y Algunas otras Redes Inalámbricas. Prospectiva, 3(2), 44–46. | spa |
dc.source.bibliographicCitation | Santiago, E., & Sánchez, J. (2017). Riesgos de Ciberseguridad en las Empresas. Revista Tecnologí@ y Desarrollo, XV. Retrieved from http://www.uax.es/publicacion/riesgos-de-ciberseguridad-en-las-empresas.pdf | spa |
dc.source.bibliographicCitation | Sari, A. (2014). Security Approaches in IEEE 802 . 11 MANET — Performance Evaluation of USM and RAS, (September), 365–372. https://doi.org/10.4236/ijcns.2014.79038 | eng |
dc.source.bibliographicCitation | Sengathir, J. (2015). A Split Half Reliability Coefficient Based Mathematical Model for Miyigating Selfish Nodes in MANETs, (August). | eng |
dc.source.bibliographicCitation | Sengathir, J., & Manoharan, R. (2015). Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. Egyptian Informatics Journal, 4(1), 43–64. https://doi.org/10.7603/s40632-016-0003-5 | eng |
dc.source.bibliographicCitation | Sharma, S., & Kumar, M. A. (2016). Performance Analysis of OLSR, AODV, DSR MANETs Routing Protocols. International Journal of Engineering Science and Computing. https://doi.org/10.4010/2016.1871 | eng |
dc.source.bibliographicCitation | Shen, H., & Li, Z. (2015). A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Transactions on Networking, 23(1), 70–84. https://doi.org/10.1109/TNET.2013.2290731 | eng |
dc.source.bibliographicCitation | Singh, K., & Verma, A. K. (2015). Applying OLSR routing in FANETs. Proceedings of 2014 IEEE International Conference on Advanced Communication, Control and Computing Technologies, ICACCCT 2014, (May 2015), 1212–1215. https://doi.org/10.1109/ICACCCT.2014.7019290 | eng |
dc.source.bibliographicCitation | Subba, B., Biswas, S., & Karmakar, S. (2016). Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation. Engineering Science and Technology, an International Journal, 19(2), 782–799. https://doi.org/10.1016/j.jestch.2015.11.001 | eng |
dc.source.bibliographicCitation | Tan, S., Li, X., & Dong, Q. (2015). Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Networks, 30(March), 84–98. https://doi.org/10.1016/j.adhoc.2015.03.004 | eng |
dc.source.bibliographicCitation | Vellingiri, J., & Saravanan, K. (2017). Defending MANET Against Flooding Attack for Medical Application. 2nd International Conference on Comunication and Electronics Systems, (Icces), 486–489. | eng |
dc.source.bibliographicCitation | Wang, S., & Xia, H. (2018). A Reputation Management Framework for MANETs. 2018 IEEE Symposium on Privacy-Aware Computing (PAC), 119–120. https://doi.org/10.1109/PAC.2018.00019 | eng |
dc.source.bibliographicCitation | Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658. https://doi.org/10.1109/TVT.2014.2313865 | eng |
dc.source.bibliographicCitation | Wu, Y., Xu, L., Lin, X., & Fang, J. (2017). A New Routing Protocol Based on OLSR Designed for UANET Maritime Search and Rescue. In S.-L. Peng, G.-L. Lee, R. Klette, & C.-H. Hsu (Eds.), Internet of Vehicles. Technologies and Services for Smart Cities (pp. 79–91). Cham: Springer International Publishing. | eng |
dc.subject | OLSR | spa |
dc.subject | MPR | spa |
dc.subject | Criptografía | spa |
dc.subject | Firma Digital | spa |
dc.subject | Generales bizantinos | spa |
dc.subject | Reputación | spa |
dc.subject | Cryptography | eng |
dc.subject | Digital signature | eng |
dc.subject | Byzantine generals | eng |
dc.subject | Reputation | eng |
dc.title | Diseño de un modelo de autenticación para fortalecer la seguridad a nivel de enrutamiento del protocolo OLSR en una MANET | spa |
dc.type | Other | spa |
sb.programa | Maestría en Ingeniería de Sistemas y Computación | spa |
sb.sede | Sede Barranquilla | spa |
Archivos
Bloque de licencias
1 - 1 de 1
No hay miniatura disponible
- Nombre:
- license.txt
- Tamaño:
- 1.71 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: