The security solution presented in this chapter is designed to be flexible. It operates independent of hashing and cryptographic algorithms, and it can use different schemes.

Implementing support for end-to-end signatures and possibility for public-key cryptography using individual key-pairs are things that could be implemented as a next step. Also, it should be considered moving the signature message to the front of the OLSR package since this message can be of variable size if using multiple schemes. If the message is put first one can avoid having to traverse all messages in the package to find the signature message. Adding IPv6 support would also be a natural next step for the implementation.

Combining the solution with some authentication and key management scheme would provide a more complete solution.

Andreas 2004-07-29