RPKI vs ROVER: comparing the risks of BGP security solutions

A Malhotra, S Goldberg - ACM SIGCOMM Computer Communication …, 2014 - dl.acm.org
BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that
result from unintentional misconfigurations or deliberate attacks. To defend against these …

RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral

AB Ordu, M Bayar, B Örs - 2022 Thirteenth International …, 2022 - ieeexplore.ieee.org
RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standardized routing
protocol that can organize thousands of resource constraint routers. Although it is an …

[图书][B] Decentralized security mechanisms for routing protocols

L Subramanian - 2005 - search.proquest.com
Today's Internet routing protocols are built upon the basic incorrect assumption that routers
propagate truthful routing information. As a result, the entire Internet infrastructure is …

[PDF][PDF] TASRS: Towards a Secure Routing System Through Internet Number Resource Certification

E Osterweil, S Amante, D McPherson - 2013 - cs.gmu.edu
Abstract The Border Gateway Protocol (BGP) is the Internet's core routing protocol. Today,
any BGP speaker can attest to be the origin for any IP prefix, and this results in the implicit …

Simulation Study of BGP Origin Validation Effect Against Mis-Origination with Internet Topology

M Ando, M Okada, A Kanaoka - 2017 12th Asia Joint …, 2017 - ieeexplore.ieee.org
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem
with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes …

Evaluation of the Deployment Status of RPKI and Route Filtering

J Deger, F Kargl - 2020 - tobias-lib.ub.uni-tuebingen.de
The Border Gateway Protocol (BGP) is an essential infrastructure element, often termed “the
glue that keeps the Internet together”. Even in its current version 4 [1], BGP misses essential …

The security appliance to bird software router

K Kim, Y Kim - Proceedings of the 8th International Conference on …, 2014 - dl.acm.org
The Internet consists of a large number of interconnected Autonomous Systems (ASes)
which exchange their routes using Border Gateway Protocol (BGP). However, it was …

Assessing the RPKI validator ecosystem

PH Friedemann, N Rodday… - … on Ubiquitous and …, 2022 - ieeexplore.ieee.org
In this work we compare seven currently available Resource Public Key Infrastructure (RPKI)
validators regarding their ease of installation, performance, consistency in results, code …

The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment

N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called
AS employs invalid routes. Recently, a data object called Autonomous System Provider …

Decentralised internet infrastructure: Securing inter-domain routing

MF Galmés, A Cabellos-Aparicio - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the inter-domain routing protocol that glues the
Internet. BGP does not incorporate security and instead, it relies on careful configuration and …