Security issues in control, management and routing protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking - Pioneering tomorrow's Internet Selected papers from the TERENA Networking Conference 2000 22–25 May 2000, Lisbon, Portugal
Firewalls Complete
Cisco Router Firewall Security
Cisco Router Firewall Security
Routing First-Step
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Quality-of-service routing for supporting multimedia applications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The computer society has not yet agreed on a standard method to measure data security and consequently to date no specific security metric has been defined for routing purposes. This paper used access control, authentication and cryptography to define routing metrics. These metrics are believed to be good, reasonable and practical. Since authentication is regarded as the first line of defense, cryptography is the key tool that ensures secure transmission of data across a network and access control systems help in guaranteeing the availability of services delivered by the information system. Each metric thus demonstrates the level of achievement in preserving the three goals of security.