1993
DOI: 10.1145/165611.165615
|View full text |Cite
|
Sign up to set email alerts
|

Integrating security in inter-domain routing protocols

Abstract: Abstrac tNetwork routing protocols work in a vulnerable environment . Unless protected by appropriate security measures, their operation can be easily subverted by intruder s capable of modifying, deleting or adding false information in routing updates . Thi s paper first analyses threats to the secure operation of inter-domain routing protocols, and then proposes various counter measures to make these protocols secur e against external threats .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

1995
1995
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…2) Alternatives to PKI: Prior to the creation of BGP version 4, Kumar and Crowcroft [82] provide an analysis of threats to interdomain routing and described security mechanisms used in the proposed IDRP protocol [83].…”
Section: ) Reducing Computational Overheadmentioning
confidence: 99%
“…2) Alternatives to PKI: Prior to the creation of BGP version 4, Kumar and Crowcroft [82] provide an analysis of threats to interdomain routing and described security mechanisms used in the proposed IDRP protocol [83].…”
Section: ) Reducing Computational Overheadmentioning
confidence: 99%
“…More recently, Bellovin and Gansner [2003] discussed potential link-cutting attacks against Internet routing. Kumar and Crowcroft [1993] proposed the use of digital signatures and sequence numbers for protecting the integrity and freshness of routing updates. For a thorough analysis of BGP vulnerabilities and protections, see Murphy [2002aMurphy [ , 2002b.…”
Section: Related Workmentioning
confidence: 99%
“…He creates a neighbour-to-neighbour digital signature of routing updates, and adds sequence numbers, timestamps, acknowledgements and retransmissions to the updates so that modification or replay of routing updates for distance-vector algorithms is prevented. Based on previous work, Kumar and Crowcroft [19] describe the implementation of secret and public key authentication to encrypt neighbour-toneighbour updates. Murphy [20] provides a scheme for securing distance-vector protocols which requires the validation of a number of nested signatures equal to the number of routers in the route path.…”
Section: Cryptography-based Techniquesmentioning
confidence: 99%