Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/523975.830483guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Securing Distance-Vector Routing Protocols

Published: 10 February 1997 Publication History

Abstract

No abstract available.

References

[1]
R. Atkinson. IP Authentication Header. RFC 1826, Aug. 1995.
[2]
R. Atkinson. Security Architecture for the Internet Protocol. RFC 1825, Aug. 1995.
[3]
D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, 2nd edition, 1992.
[4]
D. E. Eastlake 3rd and C. W. Kaufman. Domain Name System Security Extensions. Internet draft: draft-ietf-dnssec-secext-10.txt, Aug. 1996.
[5]
J. J. Garcia-Luna-Aceves and S. Murthy. A Loop-Free Path-Finding Algorithm: Specification, Verification, and Complexity. In Proceedings IEEE INFOCOM, Boston, MA, Apr. 1995.
[6]
B. Kumar. Integration of Security in Network Routing Protocols. ACM SIGSAC Review, 11(2):18-25, Spring 1993.
[7]
L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. IEEE Transactions on Programming Languages and Application Systems, 4(3):382-401, July 1982.
[8]
G. Malkin. RIP Version 2: Carrying Additoinal Information. RFC 1723, Nov. 1994.
[9]
R. T. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report 117, AT&T Bell Laboratories, Murray Hill, New Jersey 07974, Feb. 1985. ftp://netlib.att.com/netlib/ att/cs/cstr/117.ps.Z.
[10]
S. L. Murphy. Presentation in Panel on "Security Architecture for the Internet Infrastructure". Symposium on Network and Distributed System Security, Apr. 1995.
[11]
S. L. Murphy. Digital Signature Protection of the OSPF Routing Protocol. Proceedings: Symposium on Network and Distributed System Security, 1996. http://bilbo.usy.edu/sndss/sndss96.html.
[12]
S. Murthy and J. J. Garcia-Luna-Aceves. A more efficient path-finding algorithm. In 28th Asilomar Conference, pages 229-233, Pacific Grove, California, Nov. 1994.
[13]
D. Nessett. The Internet Security Architecture. In Proceedings: Internet Security Workshop. IEEE, Nov. 1994.
[14]
R. Perlman. Network Layer Protocols with Byzantine Robustness. Report MIT/LCS/TR 429, Massachmetts Institute of Technology, Oct. 1988.
[15]
Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP- 4). RFC 1771, Mar. 1995.
[16]
R. W. Shirey. Security Architecture for Internet Protocols. A Guide for Protocol Designs and Standards. Irternet Draft: draft-irtf-psrg-secarch-sect1-00.txt, Nov. 1994.
[17]
B. R. Smith and J. J. Garcia-Luna-Aceves. Securing the Border Gateway Routing Protocol. Proceedings of Global Internet '96, Nov. 1996.

Cited By

View all
  • (2010)Efficient recovery from false state in distributed routing algorithmsProceedings of the 9th IFIP TC 6 international conference on Networking10.1007/978-3-642-12963-6_16(198-212)Online publication date: 11-May-2010
  • (2008)ODSBRACM Transactions on Information and System Security10.1145/1284680.134189210:4(1-35)Online publication date: 22-Jan-2008
  • (2007)A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networksProceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks10.1145/1298239.1298255(86-94)Online publication date: 22-Oct-2007
  • Show More Cited By

Index Terms

  1. Securing Distance-Vector Routing Protocols

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SNDSS '97: Proceedings of the 1997 Symposium on Network and Distributed System Security
    February 1997
    ISBN:0818677678

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 10 February 1997

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)Efficient recovery from false state in distributed routing algorithmsProceedings of the 9th IFIP TC 6 international conference on Networking10.1007/978-3-642-12963-6_16(198-212)Online publication date: 11-May-2010
    • (2008)ODSBRACM Transactions on Information and System Security10.1145/1284680.134189210:4(1-35)Online publication date: 22-Jan-2008
    • (2007)A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networksProceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks10.1145/1298239.1298255(86-94)Online publication date: 22-Oct-2007
    • (2007)Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checkingACM Transactions on Autonomous and Adaptive Systems10.1145/1278460.12784622:3(8-es)Online publication date: 1-Sep-2007
    • (2006)Secure routing using factual correctnessProceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems10.1007/11753810_108(1197-1203)Online publication date: 15-May-2006
    • (2006)BeeHiveGuardProceedings of the 2006 international conference on Applications of Evolutionary Computing10.1007/11732242_22(243-254)Online publication date: 10-Apr-2006
    • (2005)Towards designing a trusted routing solution in mobile ad hoc networksMobile Networks and Applications10.1007/s11036-005-4454-410:6(985-995)Online publication date: 1-Dec-2005
    • (2005)A verified distance vector routing protocol for protection of internet infrastructureProceedings of the 4th international conference on Networking - Volume Part II10.1007/978-3-540-31957-3_55(463-470)Online publication date: 17-Apr-2005
    • (2004)Beware of BGP attacksACM SIGCOMM Computer Communication Review10.1145/997150.99715234:2(1-8)Online publication date: 1-Apr-2004
    • (2004)SPVACM SIGCOMM Computer Communication Review10.1145/1030194.101548834:4(179-192)Online publication date: 30-Aug-2004
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media