Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
Key Management Framework for IP Multicast Infrastructure Security
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing The Nimrod Routing Architecture
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Experimental analysis of attacks against intradomain routing protocols
Journal of Computer Security
Securing the MPLS control plane
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
The routing protocols used to disseminate routing information throughout the Internet are not protected from intruders or faulty router participants. This paper reports on work in progress to protect the OSPF routing protocol through the use of cryptography, specifically, digital signatures. The routing information is signed with an asymmetric cryptographic algorithm, allowing each router recipient to check the source and integrity of the information. This paper discusses the fundamental issues in security of routing protocols, reviews the basics of OSPF operation, describes the proposed design and discusses remaining vulnerabilities.