S Servillo, P Spadaccino, F Cuomo… - Proceedings of IFIP …, 2024 - iris.uniroma1.it
Abstract Internet Exchange Points (IXPs) play a fundamental role in the exchange of data between Internet Service Providers (ISPs). However, they face one of the main challenges of …
This document describes a method that allows parties to electronically sign Routing Policy Specification Language objects and validate such electronic signatures. This allows relying …
P Chen, X Wang, Y Wu, J Su, H Zhou - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
For Securing BGP Protocol, this paper proposes an identity-based private key infrastructure (iPKI) for managing self-attested IP (sIP) addresses. An sIP address endows the current IP …
Inter-domain routing security is of critical importance to the Internet since it prevents unwanted traffic redirections. The current system is based on a Public Key Infrastructure …
Relying party validator is a critical component of RPKI: it fetches and validates signed authorizations mapping prefixes to their owners. Routers use this information to block bogus …
A fundamental change in the Internet backbone routing started in January 2011: The Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional …
The Secure Border Gateway Protocol (S-BGP) is used when two different Autonomous System communicate with each other and upon reception of UPDATE from neighbor …
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet …