How secure are secure interdomain routing protocols?
نویسندگان
چکیده
منابع مشابه
How Small Groups Can Secure Interdomain Routing
Although the Internet’s routing system has serious security vulnerabilities, none of the existing proposals for a secure variant of BGP has been successfully deployed in practice. This is not surprising since deploying protocols that require the cooperation of tens of thousands of independentlyoperated networks is problematic. Instead, we argue that small groups should be the basis for securing...
متن کاملHow Secure are Secure Localization Protocols in WSNs?
Remote monitoring and gathering information are the main objectives behind deploying Wireless Sensor Networks (WSNs). Besides WSN issues due to communication and computation restricted resources (low energy, limited memory computational speed and bandwidth), securing sensor networks is one of the major challenges these networks have to face. In particular, the security of sensors localization i...
متن کاملDon't Secure Routing Protocols, Secure Data Delivery
Internet routing and forwarding are vulnerable to attacks and misconfigurations that compromise secure communications between end systems. With networks facing external attempts to compromise their routers [3] and insiders able to commandeer infrastructure, subversion of Internet communication is an ever more serious threat. Much prior work has proposed to improve communication security with se...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملHow Secure Are FPGAs
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2014
ISSN: 1389-1286
DOI: 10.1016/j.comnet.2014.05.007