The exchange of topology information is a potential attack target in mobile ad-hoc networks. To provide an intrinsic security mechanism, it is possible to validate topology advertisements in the control plane against records of the path taken by transmission in the data plane. In this context, we provide a discussion of different path recording mechanisms. We evaluate their performance in terms of packet overhead and reconstruction complexity.
展开▼