Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security
DOI: 10.1109/ndss.1997.579226
|View full text |Cite
|
Sign up to set email alerts
|

Reducing the cost of security in link-state routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(28 citation statements)
references
References 18 publications
0
28
0
Order By: Relevance
“…Literature has many innovative methods [6,7,8] to ensure security for an ad hoc network. A suggestion is that there is a distinction between a network with an a priori trust relationship between nodes and one which lacks trust between nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Literature has many innovative methods [6,7,8] to ensure security for an ad hoc network. A suggestion is that there is a distinction between a network with an a priori trust relationship between nodes and one which lacks trust between nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Addressing the cost of public key security in link state routing, Hauser, etc [10] present an efficient authentication mechanism with one-way hash chain function which was originally developed by Merkle, Lamport [6]. By hashing the time and a secrete number, each router generates two distinct hash chains with n distinct values for two link states, UP and DOWN, separately.…”
Section: Related Workmentioning
confidence: 99%
“…To solve the limitations mentioned in [10], Cheung [7] proposed an improved hash-chain authentication approach to efficiently protect the link state routing messages. After detecting the compromise, a bad routing update advertisement (BURA) including one bogus LSA with the smallest sequence number or largest checksum (s) is generated and signed with its private key, then flooded into the entire network.…”
Section: Related Workmentioning
confidence: 99%
“…[19,12]), those in which skipping elements is rare (e.g. [8,13,33]), and those in which skipping elements is common (e.g. [27]).…”
Section: Verification Of One-way Chain Valuesmentioning
confidence: 99%
“…Lamport first proposed to use one-way chains for efficient authentication of one-time passwords [19], which Haller later refined to the S/KEY standard [12]. Since Lamport's work, many researchers proposed to use one-way chains as a basic building block for a variety of applications, for example for digital cash [2,14,26,30], for extending the lifetime of digital certificates [1,24], for constructing one-time signatures [10,22,23,31], for authenticating link-state routing updates [8,13,33], or for efficient packet authentication [27]. Despite the computational efficiency of one-way functions, one-way chains are still challenging to use in resource-constrained environments, such as on small mobile devices or sensor networks.…”
Section: Introductionmentioning
confidence: 99%