Hi Stan,
I think it did go to MANET...but the subject contained [aodvv2-discuss]
which makes it look like it went to our list...
Vicky.
On Fri, Feb 19, 2016 at 3:08 PM, Ratliff, Stanley <sratliff@xxxxxxxxxxx>
wrote:
Lotte,
I don't see that this went anywhere but aodvv2-discuss. Shouldn't it have
gone to manet?
Regards,
Stan
-----Original Message-----these e-
From: aodvv2-discuss-bounce@xxxxxxxxxxxxx [mailto:aodvv2-discuss-
bounce@xxxxxxxxxxxxx] On Behalf Of Lotte Steenbrink
Sent: Friday, February 19, 2016 10:06 AM
To: manet@xxxxxxxx
Subject: [aodvv2-discuss] AODVv2: Security considerations update
Hi all,
in the interest of transparency, we (the AODVv2 author team) want to send
out more updates on what we've been doing, and this is the first of
mails. We've restructured (and sometimes rewritten) our securitywe'd
considerations a bit and added a subsection about the Trust Model, and
love to hear your opinions on those changes. You can find the result anda
diff to the current considerations in the attachments. (the formattingwas
done manually, so it might be a bit wonky)can!
Some notes:
* This is all work in progress, so please poke holes into it where you
* While (afaik) the Availability/Confidentiality/Integrity model may beunauthorized
considered a bit dated, I thought it might be a good starting point.
* I was wondering if "Encryption will not only protect against
devices obtainingmaybe
information about network topology" isn't a tad too short and bold-
we could add a clarification along the lines of:devices to
Encryption will not only make it more difficult for unauthorized
obtaintrusted
information about network topology but will also ensure that only
routers participate in routing operations: When messages areencrypted,
a malicious observer would have to monitor the entire network torather
understand
its topology and traffic flow. And even then, due to the hop by hop
nature of the protocol and the fact that messages are regenerated
than forwarded (resulting in a different payload every time),not
following the path of a message would be hard if its transmission is
the only encrypted traffic produced by the network.
Regards,
Lotte
_____________________________________________________
This electronic message and any files transmitted with it contains
information from iDirect, which may be privileged, proprietary
and/or confidential. It is intended solely for the use of the individual
or entity to whom they are addressed. If you are not the original
recipient or the person responsible for delivering the email to the
intended recipient, be advised that you have received this email
in error, and that any use, dissemination, forwarding, printing, or
copying of this email is strictly prohibited. If you received this email
in error, please delete it and immediately notify the sender.
_____________________________________________________