The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …

The Use of Maxlength in the RPKI

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2018 - open.bu.edu
The use of maxLength in the RPKI Toggle navigation Boston University Libraries OpenBU
Toggle navigation View Item OpenBU BU Open Access Articles BU Open Access Articles View …

Rpkiller: Threat analysis from an RPKI relying party perspective

K Van Hove, J van der Ham… - arXiv preprint arXiv …, 2022 - arxiv.org
The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an
infrastructure where resource holders can make attestations about their resources. RPKI …

RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI

W Li, Z Lin, MI Ashiq, E Aben, R Fontugne… - Proceedings of the …, 2023 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a system to add security to the Internet
routing. In recent years, the publication of Route Origin Authorization (ROA) objects, which …

Are we there yet? On RPKI's deployment and security

Y Gilad, A Cohen, A Herzberg, M Schapira… - Cryptology ePrint …, 2016 - eprint.iacr.org
Abstract The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners'
public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing …

[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI).

Z Yan, G Geng, H Nakazato, YJ Park - J. Internet Serv. Inf. Secur., 2018 - isyou.info
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

IRR Hygiene in the RPKI Era

B Du, G Akiwate, T Krenc, C Testart, A Marder… - … Conference on Passive …, 2022 - Springer
Abstract The Internet Route Registry (IRR) and Resource Public Key Infrastructure (RPKI)
both emerged as different solutions to improve routing security in the Border Gateway …

Assessing the RPKI validator ecosystem

PH Friedemann, N Rodday… - … on Ubiquitous and …, 2022 - ieeexplore.ieee.org
In this work we compare seven currently available Resource Public Key Infrastructure (RPKI)
validators regarding their ease of installation, performance, consistency in results, code …