@. U. Herberg, R. Cole, and T. Clausen, Definition of Managed Objects for the MANET Optimized Link State Routing Protocol version 2, Internet Draft, pp.2-03, 2011.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-06, 2010.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-05, 2010.

@. U. Herberg and T. Clausen, MANET Cryptographical Signature TLV Definition Internet Draft (work in progress), draft-ietf-manet-packetbb-sec-02, 2010.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-04, 2010.

@. U. Herberg, R. Cole, and T. Clausen, Definition of Managed Objects for the MANET Optimized Link State Routing Protocol version 2, Internet Draft, pp.2-02, 2010.

@. U. Herberg and T. Clausen, MANET Cryptographical Signature TLV Definition Internet Draft (work in progress), draft-ietf-manet-packetbb-sec-01, 2010.

@. U. Herberg and T. Clausen, MANET Cryptographical Signature TLV Definition Internet Draft (work in progress), draft-ietf-manet-packetbb-sec-00, 2010.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-03, 2010.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-02, 2009.

@. U. Herberg, R. Cole, and T. Clausen, Definition of Managed Objects for the MANET Optimized Link State Routing Protocol version 2, Internet Draft, pp.2-3, 2009.

@. U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol " , Internet Draft (work in progress), draft-ietf-manet-nhdp-mib-01, 2009.

V. Trace-file, displaying neighbor-/2-hop-and topology-tuples of a selected router, p.30

I. Classic and ). Linkr, Model: hosts (H) connected to the same link have assigned IP addresses from a common prefix, p.50

M. Misconfigured, MANET interfaces configured with a shared /24 prefix, causing router 192.126.1.2 to produce an ICMP redirect when forwarding IP datagrams from 192, p.52

A. Manet, four MANET routers (MRs), with MR 1 connected via a classical IP link to a non-MANET router R. Is this a " connected MANET, p.56

M. Subordinate, The MANET is imposed an addressing hierarchy by a superordinate router, p.60

M. Sample, Router '0' in the middle of the area is the SNMP manager with routes calculated by OLSRv2 to all other reachable routers, which run an SNMP agent, p.134

. Godrp-with-link-buffering, GodRP-LB " ) does not represent an upper bound in terms of data delivery ratio for routing protocols with link buffering, p.148

A. Link-buffering-states, 144 10.2 Simulation settings, 150 12.1 Simulation Results: per-message signature overhead . . . . . . . . . . . . . . . . 188

I. S. Consortium, http://www.isc.org/solutions/survey, Bibliography ISC Domain Survey AS65000 BGP Table Statistics, issue.2

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, BGP routing stability of popular destinations, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637232

J. Li, M. Guidero, Z. Wu, E. Purpus, and T. Ehrenkranz, BGP routing dynamics revisited, ACM SIGCOMM Computer Communication Review, vol.37, issue.2, pp.5-16, 2007.
DOI : 10.1145/1232919.1232921

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.3722

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, Delayed Internet routing convergence, IEEE/ACM Transactions on Networking, vol.9, issue.3, pp.293-306, 2001.
DOI : 10.1109/90.929852

URL : http://athos.rutgers.edu/~rmartin/teaching/fall04/cs552/readings/lab01.pdf

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey et al., Observation and analysis of BGP behavior under stress, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637231

F. Baker, An outsider's view of MANET Internet Draft, work in progress, draft-baker-manet-review-01, 2002.

A. Tanenbaum, Computer Networks, 2002.

K. Hubbard, M. Kosters, D. Conrad, D. Karrenberg, and J. Postel, Internet Registry IP Allocation Guidelines, 1996.
DOI : 10.17487/rfc2050

S. Corson and J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, 1999.
DOI : 10.17487/rfc2501

H. Suzuki, Y. Kaneko, K. Mase, S. Yamazaki, and H. Makino, Seattlewireless website An Ad Hoc Network in the Sky, SKYMESH, for Large-Scale Disaster Recovery, Proceedings of the 64th IEEE Vehicular Technology Conference, 2006.

. Scatterweb, MSB430 Specification

I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, vol.40, issue.8, pp.102-114, 2002.
DOI : 10.1109/MCOM.2002.1024422

S. Thomson, T. Narten, and T. Jinmei, IPv6 Stateless Address Autoconfiguration, 2007.
DOI : 10.17487/rfc1971

R. Droms, Dynamic Host Configuration Protocol, 1997.

U. Herberg and T. Clausen, Yet Another Autoconf Proposal (YAAP) for Mobile Ad Hoc NETworks, 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010.
DOI : 10.1109/MSN.2010.48

URL : https://hal.archives-ouvertes.fr/inria-00504820

T. Henderson, P. Spagnolo, and J. Kim, A wireless interface type for OSPF, IEEE Military Communications Conference, 2003. MILCOM 2003., 2003.
DOI : 10.1109/MILCOM.2003.1290406

C. Adjih, E. Baccelli, and P. Jacquet, Link state routing in wireless ad-hoc networks, IEEE Military Communications Conference, 2003. MILCOM 2003., 2003.
DOI : 10.1109/MILCOM.2003.1290410

URL : https://hal.archives-ouvertes.fr/hal-00781832

G. Tassey, Standardization in technology-based markets, Research Policy, vol.29, issue.4-5, pp.587-602, 2000.
DOI : 10.1016/S0048-7333(99)00091-8

P. Hoffman and S. Harris, The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force, 2006.
DOI : 10.17487/rfc4677

I. Manet and . Group, Charter of the working group

T. Clausen, C. Dearlove, and B. Adamson, Jitter Considerations in Mobile Ad Hoc Networks (MANETs), 2008.
DOI : 10.17487/rfc5148

T. Clausen and C. Dearlove, Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs), 2009.
DOI : 10.17487/rfc5497

I. Chakeres and C. Perkins, Dynamic MANET On-demand (DYMO) Routing Internet Draft, work in progress, draft-ietf-manet-dymo-21, 2010.

T. Clausen, C. Dearlove, and P. Jacquet, The Optimized Link-state Routing Protocol version 2 Internet Draft, work in progress, draft-ietf-manet-olsrv2-11, 2010.

J. Macker, Simplified Multicast Forwarding Internet Draft, work in progress, draft-ietf-manet-smf-11, 2011.

I. Autoconf and . Group, Charter of the working group

E. Baccelli and M. Townsley, IP Addressing Model in Ad Hoc Networks, 2010.
DOI : 10.17487/rfc5889

T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui et al., RPL: IPv6 Routing Protocol for Low power and Lossy Networks, Internet Draft, p.19, 2011.
DOI : 10.17487/rfc6550

U. Herberg and I. Taylor, Development Framework for Supporting Java NS2 Routing Protocols, 2010 5th International Conference on Future Information Technology, 2010.
DOI : 10.1109/FUTURETECH.2010.5482665

E. Baccelli, T. Clausen, U. Herberg, and C. Perkins, IP Links in Multihop Ad Hoc Wireless Networks, Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2009.
URL : https://hal.archives-ouvertes.fr/hal-00651495

U. Herberg, JOLSRv2 ? an OLSRv2 implementation in Java, Proceedings of the 4th OLSR Interop workshop, 2008.

U. Herberg, T. Clausen, and R. Cole, MANET network management and performance monitoring for NHDP and OLSRv2, 2010 International Conference on Network and Service Management, 2010.
DOI : 10.1109/CNSM.2010.5691209

URL : https://hal.archives-ouvertes.fr/inria-00490958

U. Herberg, R. Cole, and I. Chakeres, Definition of Managed Objects for the Neighborhood Discovery Protocol Internet Draft, work in progress, draft-ietf-manet- nhdp-mib-07, 2011.

U. Herberg, R. Cole, and T. Clausen, Definition of Managed Objects for the Optimized Link State Routing Protocol version 2 Internet Draft, work in progress, draft-ietf-manet-olsrv2-mib-03, 2011.

U. Herberg and T. Clausen, SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2), International journal of Network Security & Its Applications, vol.2, issue.2, 2010.
DOI : 10.5121/ijnsa.2010.2213

URL : https://hal.archives-ouvertes.fr/inria-00460419

T. Clausen and U. Herberg, Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2), 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010.
DOI : 10.1109/WCINS.2010.5544732

URL : https://hal.archives-ouvertes.fr/inria-00456376

U. Herberg, T. Clausen, and J. Milan, Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2, 2010 International Conference on Internet Technology and Applications, 2010.
DOI : 10.1109/ITAPP.2010.5566285

URL : https://hal.archives-ouvertes.fr/inria-00460057

T. Clausen and U. Herberg, Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2), 2010 Fourth International Conference on Network and System Security, 2010.
DOI : 10.1109/NSS.2010.20

URL : https://hal.archives-ouvertes.fr/inria-00472654

U. Herberg and T. Clausen, MANET Cryptographical Signature TLV Definition Internet Draft, work in progress, draft-ietf-manet-packetbb-sec-03, 2011.

T. Clausen and U. Herberg, Multipoint-to-Point and Broadcast in RPL, 2010 13th International Conference on Network-Based Information Systems, 2010.
DOI : 10.1109/NBiS.2010.38

URL : https://hal.archives-ouvertes.fr/inria-00470377

U. Herberg and T. Clausen, Study of multipoint-to-point and broadcast traffic performance in the ???IPv6 Routing Protocol for Low Power and Lossy Networks???, Journal of Ambient Intelligence and Humanized Computing, vol.2, issue.4, 2011.
DOI : 10.1007/s12652-011-0046-2

K. Fall and K. Varadhan, The Network Simulator ? NS-2

E. Weingartner, H. Vom-lehn, and K. Wehrle, A Performance Comparison of Recent Network Simulators, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5198657

S. Kurkowski, T. Camp, N. Mushell, and M. Colagrosso, A Visualization and Analysis Tool for NS-2 Wireless Simulations: iNSpect, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005.
DOI : 10.1109/MASCOTS.2005.11

I. Taylor, B. Adamson, I. Downard, and J. Macker, AgentJ: Enabling Java NS-2 Simulations for Large Scale Distributed Multimedia Applications, The 2nd International Conference on Distributed Frameworks for Multimedia Applications, 2006.
DOI : 10.1109/DFMA.2006.296911

S. Kurkowski, T. Camp, and M. Colagrosso, MANET simulation studies, ACM SIGMOBILE Mobile Computing and Communications Review, vol.9, issue.4, pp.50-61, 2005.
DOI : 10.1145/1096166.1096174

S. Liang, Java Native Interface: Programmer's Guide and Specification, 1999.

R. Hinden and S. Deering, IP Version 6 Addressing Architecture, Olsr.org OLSR implementation, 2006.

T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), p.3626, 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

T. Boot, Analysis of MANET and NEMO Internet Draft, work in progress, draft-boot-manet-nemo-analysis-01, 2007.

K. Mase and K. Akima, Prefix Distribution Framework for Connected MANETs Internet Draft, work in progress, draft-mase-autoconf-prefix-framework-00, 2007.

S. Ruffino, P. Stupar, T. Clausen, and S. Singh, Connectivity Scenarios for MANET Internet Draft, work in progress, draft-ruffino-autoconf-conn-scenarios-00, 2006.

N. Shenoy, Y. Pan, and V. G. Reddy, Bandwidth reservation and QoS in internet MANETs, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005., 2005.
DOI : 10.1109/ICCCN.2005.1523885

J. F. Kurose and K. W. Ross, Computer Networking: a Top-Down Approach Featuring the Internet Package, 2000.

O. Troan and R. Droms, IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6, 2003.
DOI : 10.17487/rfc3633

T. Narten, E. Nordmark, W. Simpson, and H. Soliman, Neighbor Discovery for IP version 6 (IPv6), 2007.
DOI : 10.17487/rfc1970

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.2632

C. Bernardos, M. Calderon, and H. Moustafa, Survey of IP address autoconfiguration mechanisms for MANETs Internet Draft, work in progress, draft-bernardos- manet-autoconf-survey-05, 2010.

M. Thoppian and R. Prakash, A distributed protocol for dynamic address assignment in mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.5, issue.1, pp.4-19, 2006.
DOI : 10.1109/TMC.2006.2

A. Tayal and L. Patnaik, An address assignment for the automatic configuration of mobile ad hoc networks, Personal and Ubiquitous Computing, pp.47-54, 2004.
DOI : 10.1007/s00779-003-0256-5

M. Mohsin and R. Prakash, IP address assignment in a mobile ad hoc network, MILCOM 2002. Proceedings, 2002.
DOI : 10.1109/MILCOM.2002.1179586

J. Linton, Automatic router configuration protocol Internet Draft, work in progress, draft-linton-arcp-00, 2002.

Y. Noisette and A. Williams, A framework for zerouter operations Internet Draft, work in progress, draft-noisette-zerouter-frmwk-00, 2003.

A. White, Zero-configuration subnet prefix allocation using UIAP Internet Draft, work in progress, draft-white-zeroconf-subnet-alloc-01, 2002.

K. Weniger, PACMAN: passive autoconfiguration for mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.23, issue.3, pp.507-519, 2005.
DOI : 10.1109/JSAC.2004.842539

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.1292

I. Chakeres, IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols, 2009.
DOI : 10.17487/rfc5498

P. Leach, M. Mealling, and R. Salz, A Universally Unique IDentifier (UUID) URN Namespace, 2005.
DOI : 10.17487/rfc4122

C. Perkins, E. Belding-royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, p.3561, 2003.
DOI : 10.17487/rfc3561

B. Gebremichael, F. Vaandrager, and M. Zhang, Analysis of the zeroconf protocol using UPPAAL, Proceedings of the 6th ACM & IEEE International conference on Embedded software , EMSOFT '06, 2006.
DOI : 10.1145/1176887.1176923

G. Behrmann, A. David, and K. G. Larsen, A Tutorial on Uppaal, 2004.
DOI : 10.1007/978-3-540-30080-9_7

C. Dearlove, New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2, Proceedings of the Information Systems and Technology Panel (IST) Symposium, 2010.

T. Cormen, C. Leiserson, R. R. , and C. Stein, Introduction to Algorithms, 2001.

E. Dijkstra, A note on two problems in connexion with graphs, Numerische Mathematik, vol.4, issue.1, pp.269-271, 1959.
DOI : 10.1007/BF01386390

T. Clausen, T. Olesen, and N. Larsen, Investigating broadcast performance in Mobile Adhoc Networks, Proceedings of the IEEE conference on Wireless Personal Multimedia Communications (WPMC), 2002.

A. Qayyum, L. Viennot, and A. Laouiti, Multipoint relaying: An efficient technique for flooding in mobile wireless networks, Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS), 2001.
URL : https://hal.archives-ouvertes.fr/inria-00072756

. Hipercom@lix, GNU diff website

D. Eppstein and J. Wang, A steady state model for graph power laws Arxiv preprint cs, 2002.

P. Erdos and A. Renyi, On random graphs, Publ. Math. Debrecen, vol.6, pp.290-297, 1959.

N. University, RFC 5444 implementation

. Apache, Tomcat Server

S. Taoka, D. Takafuji, T. Iguchi, and T. Watanabe, Performance Comparison of Algorithms for the Dynamic Shortest Path Problem, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.90, issue.4, pp.847-856, 2007.
DOI : 10.1093/ietfec/e90-a.4.847

C. Demetrescu and G. F. Italiano, Experimental analysis of dynamic all pairs shortest path algorithms, ACM Transactions on Algorithms, vol.2, issue.4, pp.578-601, 2006.
DOI : 10.1145/1198513.1198519

P. Narvaez, S. Kai-yeung, and T. Hong-yi, New dynamic algorithms for shortest path tree computation, IEEE/ACM Transactions on Networking, vol.8, issue.6, pp.734-746, 2000.
DOI : 10.1109/90.893870

B. Xiao, J. Cao, Q. Zhuge, Z. Shao, and E. Sha, Dynamic update of shortest path tree in OSPF, Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN), pp.18-23, 2004.

B. Xiao, J. Cao, and Q. Lu, Dynamic SPT update for multiple link state decrements in network routing, The Journal of Supercomputing, vol.11, issue.1, pp.237-256, 2008.
DOI : 10.1007/s11227-007-0164-y

V. Eramo, M. Listanti, and A. Cianfrani, Implementation and Performance Evaluation of a Multi-Path Incremental Shortest Path Algorithm in Quagga Routing Software, Proceedings of the 7th International Workshop on Design of Reliable Communication Networks, 2007.

J. Case, K. Mccloghrie, M. Rose, and S. Waldbusser, Introduction to version 2 of the Internet-standard Network Management Framework, 1441.

R. Presuhn, Version 3 of the Protocol Operations for the Simple Network Management Protocol (SNMP), 2002.
DOI : 10.17487/rfc3416

U. Blumenthal and B. Wijnen, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), 2002.

B. Wijnen, R. Presuhn, and K. Mccloghrie, View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP), 2002.

C. Chiang, S. Demers, P. Gopalakrishnan, L. Kant, A. Poylisher et al., Performance Analysis of Drama: A Distributed Policy-Based System for Manet Management, MILCOM 2006, 2006.
DOI : 10.1109/MILCOM.2006.302135

H. Choi, N. Kim, and H. Cha, 6LoWPAN-SNMP: Simple Network Management Protocol for 6LoWPAN, 2009 11th IEEE International Conference on High Performance Computing and Communications, 2009.
DOI : 10.1109/HPCC.2009.49

A. Jacquot, J. Chanet, K. Hou, X. Diao, and J. Li, A New Approach for Wireless Sensor Network Management: LiveNCM, 2008 New Technologies, Mobility and Security, 2008.
DOI : 10.1109/NTMS.2008.ECP.10

D. Kiwior, D. Dunbrack, and D. Parker, Performance analysis of SNMP in airborne tactical networks, Proceedings of the IEEE Military Communications Conference (MIL- COM), 2008.

R. Badonnel, R. Festor, O. Team, L. Lorraine, and V. Nancy, Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, pp.339-350, 2006.
DOI : 10.1109/NOMS.2006.1687564

URL : https://hal.archives-ouvertes.fr/inria-00090206

V. Pacheco, R. Puttini, and R. Badonnel, An administration structure for the OLSR protocol Management of mobile ad hoc networks: information model and probe-based architecture, Proceedings of the International Conference on Computational Science and Its Applications, pp.335-347, 2005.

R. G. Cole, J. Macker, and A. Morton, Definition of Managed Objects for Performance Reporting Internet Draft, work in progress, draft-ietf-manet-report-mib- 01, 2011.

A. Bhattacharyya, On a measure of divergence between two statistical populations defined by their probability distributions, Bull. Calcutta Math. Soc, vol.35, pp.99-109, 1943.

L. Andrey, O. Festor, A. Lahmadi, A. Pras, and J. Schönwälder, Survey of SNMP performance analysis studies, International Journal of Network Management, vol.7, issue.1, pp.527-548, 2009.
DOI : 10.1002/nem.729

URL : https://hal.archives-ouvertes.fr/inria-00432582

R. Enns, NETCONF Configuration Protocol, 2006.
DOI : 10.17487/rfc4741

U. Blumenthal, F. Maino, and K. Mccloghrie, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model, 2004.
DOI : 10.17487/rfc3826

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology?EUROCRYPT 2005, pp.19-35, 2005.
DOI : 10.1007/11426639_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718

T. Clausen and K. Mase, Link Buffering for MANETs Internet Draft, work in progress, draft-clausen-manet-linkbuffer-00, 2004.

C. Hutzler, D. Crocker, P. Resnick, E. Allman, and T. Finch, RFC5068: Email Submission Operations: Access and Accountability Requirements, 2007.
DOI : 10.17487/rfc5068

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.4599

J. Joseph, A. Das, and B. Lee, Security Threats in Ad Hoc Routing Protocols, Guide to Wireless Ad Hoc Networks, pp.1-18, 2009.
DOI : 10.1007/978-1-84800-328-6_18

N. Komninos, D. Vergados, and C. Douligeris, Security for Ad Hoc Networks, Handbook of Information and Communication Security, pp.421-432, 2010.
DOI : 10.1007/978-3-642-04117-4_22

C. Sreedhar, S. Verma, and N. Kasiviswanath, A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols, International Journal on Computer Science and Engineering (IJCSE), vol.2, issue.2, pp.224-232, 2010.

P. Yi, Y. Wu, F. Zou, and N. Liu, A Survey on Security in Wireless Mesh Networks, IETE Technical Review, vol.27, issue.1, pp.6-14, 2010.
DOI : 10.4103/0256-4602.58969

C. Adjih, D. Raffo, and P. Mühlethaler, Attacks against OLSR: Distributed key management for security, Proceedings of the OLSR Interop and Workshop, 2004.

A. Fourati, H. Badis, and K. Agha, Security Vulnerabilities Analysis of the OLSR Routing Protocol, Proceedings of the 12th International Conference on Telecommunications , ICT, 2005.

B. Kannhavong, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, A study of a routing attack in OLSR-based mobilead hoc networks, International Journal of Communication Systems, vol.2, issue.11, pp.1245-1261, 2007.
DOI : 10.1002/dac.870

Y. Li, C. Wang, W. Zhao, and X. You, The Jamming problem in IEEE 802.11-based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement, International Journal of Communication Systems, vol.10, issue.8, pp.937-958, 2009.
DOI : 10.1002/dac.1007

C. Adjih, E. Baccelli, T. Clausen, P. Jacquet, and G. Rodolakis, Fish eye OLSR scaling properties, Journal of Communications and Networks, vol.6, issue.4, pp.343-351, 2004.
DOI : 10.1109/JCN.2004.6596835

URL : https://hal.archives-ouvertes.fr/hal-00654544

L. Viennot, Complexity results on election of multipoint relays in wireless networks, INRIA, Tech. Rep, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00073097

B. Kaliski and J. Staddonh, PKCS 1: RSA Cryptography Specifications Version 2.0, 1998.
DOI : 10.17487/rfc2437

D. Johnson, A. Menezes, and S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, pp.36-63, 2001.
DOI : 10.1007/s102070100002

H. Krawczyk and M. Bellare, HMAC: Keyed-Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

G. Pottie and W. Kaiser, Wireless integrated network sensors, Communications of the ACM, vol.43, issue.5, pp.51-58, 2000.
DOI : 10.1145/332833.332838

M. Goyal, E. Baccelli, A. Brandt, R. Cragie, and J. Martocci, Reactive Discovery of Pointto-Point Routes in Low Power and Lossy Networks, Internet Draft, work in progress, pp.2-03, 2011.

]. P. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks, Proceedings of the 1st Symposium on Networked Systems Design and Implementation, 2004.

J. Hui, J. Vasseur, D. Culler, and V. Manral, An IPv6 Routing Header for Source Routes with RPL Internet Draft, work in progress, draft-ietf-6man-rpl-routing- header-03, 2011.

T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation through Experiments and Simulation, Proceedings of the IEEE Symposium on Wireless Personal Mobile Communications, 2001.