Security analysis of TORA routing protocol
In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages...
| Main Authors: | , |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3195/ |