1. Introduction Implicit trust within OLSR Applying trust to mitigate OLSR vulnerabilities Conclusions/future works Bibliography D Analysis of the implicit trust within OLSRAsmaa…