Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Integration of security in network routing protocols

Integration of security in network routing protocols There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Integration of security in network routing protocols

ACM SIGSAC Review , Volume 11 (2) – Apr 1, 1993

Loading next page...
 
/lp/association-for-computing-machinery/integration-of-security-in-network-routing-protocols-VAOmFyhwx0

References (17)

Publisher
Association for Computing Machinery
Copyright
Copyright © 1993 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/153949.153953
Publisher site
See Article on Publisher Site

Abstract

There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Apr 1, 1993

There are no references for this article.