Øivind Kure

Learn More
—In this paper we present a mechanism for securing the OLSR protocol. This mechanism is implemented as an extension to the OLSR source code provided from UniK (www.olsr.org), and can be downloaded freely from the Internet. The proposed and implemented mechanism is based on signing each OLSR control packet with a digital signature for authenticating this(More)
In a MANET network where nodes move frequently, the probability of connectivity loss between nodes might be high, and communication sessions may easily loose connectivity during transmission. The routing protocol is designed to find alternative paths in these situations. This rerouting takes time, and the latency is referred to as the rerouting time. This(More)
In this article we discuss the use of commonly deployed IP multicast protocols in UMTS networks. We analyze three possible UMTS multicast architectures, all employing standard IP multicast protocols. We study the architectures' ability to handle: group management, data-security, authentication and authorization of multicast source/receivers, multicast(More)
Tactical military coalition force IP networks will have to offer quality of service. Service level agreements and service level specifications are important elements of the QoS architecture in civilian networks. However, SLAs/SLSs in military coalition networks should not be applied in the same fashion as in a commercial network. Our contribution is to(More)
Due to the fact that high datarate has shorter transmission range, the benefit of using high datarate may be degraded for IEEE 802.11 based multihop ad hoc networks. In this paper, we evaluate the performance of multihop ad hoc networks at multirates, in terms of the number of hops between source and destination, throughput, and end-to-end delay. Through(More)
Dealing with link breaks in MANETs is a challenge for the routing protocol. This paper proposes a mechanism to reduce the negative impact of link breaks on the routing. The transmission area of a node is divided into a safe zone close to the node and an unsafe zone (i.e. buffer zone) near the end of the transmission range. The probability is high that link(More)
We propose and analyze an augmented DiffServ architecture for ad hoc networks. A scheme based on shadow classes and ECN is used to control the load. By including ECN we are able to regulate the admitted flows and the best-effort traffic in order to avoid congestion and improve the conditions for the prioritized traffic. Through simulations we analyze the(More)