From: A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
Ref # | Routing Protocols | Optimization | Security | Other capabilities |
---|---|---|---|---|
[5] | OLSR | Use TC and Hello messages | Encryption and digital signatures to protect TC & Hello messages | Choosing DCA server nodes based on hop counts |
[12] | OLSR | Use TC and Hello messages | Identity-based encryption | Reduce communication overhead |
[7] | Reactive routing protocols | MP or MOCA Certification protocol, B-unicast to replace flooding | Utilize route cache information, creating reverse path in CREQ forwarding | Â |
[13] | Reactive routing protocols | Piggybacking of CREQ & CREP on the routing packets | CRLs maintenance and deployment | Handle network partitioning |