Integration of security in network routing protocols
- 1 April 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGSAC Review
- Vol. 11 (2) , 18-25
- https://doi.org/10.1145/153949.153953
Abstract
There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.Keywords
This publication has 9 references indexed in Scilit:
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- OSPF specificationPublished by RFC Editor ,1989
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- Routing Information ProtocolPublished by RFC Editor ,1988
- Secure communication using remote procedure callsACM Transactions on Computer Systems, 1985
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A note on two problems in connexion with graphsNumerische Mathematik, 1959