Integration of security in network routing protocols

  • Authors:
  • Brijesh Kumar

  • Affiliations:
  • -

  • Venue:
  • ACM SIGSAC Review
  • Year:
  • 1993

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.