Integrating security in inter-domain routing protocols
- 1 October 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGCOMM Computer Communication Review
- Vol. 23 (5) , 36-51
- https://doi.org/10.1145/165611.165615
Abstract
Network routing protocols work in a vulnerable environment. Unless protected by appropriate security measures, their operation can be easily subverted by intruders capable of modifying, deleting or adding false information in routing updates. This paper first analyses threats to the secure operation of inter-domain routing protocols, and then proposes various counter measures to make these protocols secure against external threats.Keywords
This publication has 9 references indexed in Scilit:
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Secure control of transit internetwork trafficComputer Networks and ISDN Systems, 1991
- Border Gateway Protocol 3 (BGP-3)Published by RFC Editor ,1991
- The DARPA internet protocol suiteIEEE Communications Magazine, 1985
- Secure communication using remote procedure callsACM Transactions on Computer Systems, 1985
- End-to-end arguments in system designACM Transactions on Computer Systems, 1984
- Digital signatures with RSA and other public-key cryptosystemsCommunications of the ACM, 1984
- Internet ProtocolPublished by RFC Editor ,1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978