Enhancing the trust of internet routing with lightweight route attestation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
An infrastructure supporting secure internet routing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
The security appliance to BIRD software router
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
The border gateway protocol possesses security vulnerabilities, because speakers can lie. Proposed security protocols can address the vulnerabilities, but can significantly increase the performance overheads, which prevent their real-world deployment. Public key cryptography can address these vulnerabilities. We report our research into analyzing recently proposed security protocols and building simulation frameworks to evaluate their costs, and designing and validating techniques to reduce them.