Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Experimental analysis of attacks against intradomain routing protocols
Journal of Computer Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
A verified distance vector routing protocol for protection of internet infrastructure
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Hi-index | 0.00 |
There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.