Security analysis of TORA routing protocol

In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages...

Full description

Bibliographic Details
Main Authors: Chee, Vee Liem, Yau, Wei Chuen
Format: Conference or Workshop Item
Published: 2007
Subjects:
Online Access:http://shdl.mmu.edu.my/3195/