Analysis of impact of trust on Secure Border Gateway Protocol

J Israr, M Guennoun, HT Mouftah - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE
message, an S-BGP speaker must verify nested signatures of all nodes in the traversed …

Detecting bogus BGP route information: Going beyond prefix hijacking

J Qiu, L Gao, S Ranjan, A Nucci - 2007 Third International …, 2007 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of the Internet.
However, the BGP system has been built based on the implicit trust among individual …

Employing SABRE relay network for Country-Wide Blockchain network

A Pandey, H Chaouchi - 2020 Second International …, 2020 - ieeexplore.ieee.org
Internet is taking a turn; services are moving more from centralised to decentralised
approach bringing in the revolutions and speeds in the large-industrial applications and …

A review on inter-domain routing system vulnerabilities and security solutions

Y Guo, F Miao, L Zhang, J Yan - 11th International Conference …, 2015 - ieeexplore.ieee.org
The BGP-based inter-domain routing system plays an important role in the Internet. Not only
the performance of data forwarding, but also the topology, robustness, and security of the …

[PDF][PDF] A novel approach for secure routing through BGP using symmetric key

D Raimagia, S Singh, S Zafar - … Journal of Network Security & Its …, 2013 - academia.edu
ABSTRACT The Border Gateway Protocol (BGP) is the path vector routing protocol that
connects different autonomous systems.. These ASes have unique integer numbers which …

Securing BGP communities: design of a new RPKI object to mitigate BGP community attacks

R Huisman - 2022 - repository.tudelft.nl
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack
that exploits the community attribute. These community attacks can influence BGP routing in …

How secure are secure interdomain routing protocols

S Goldberg, M Schapira, P Hummon… - ACM SIGCOMM Computer …, 2010 - dl.acm.org
In response to high-profile Internet outages, BGP security variants have been proposed to
prevent the propagation of bogus routing information. To inform discussions of which variant …

A cascading failure model for interdomain routing system

Y Guo, Z Wang, S Luo, Y Wang - International Journal of …, 2012 - Wiley Online Library
There have been many researches on border gateway protocol (BGP) security, most of
which mainly focused on how to enhance the security of the BGP protocol or the interdomain …

[PDF][PDF] A trusted centralized public key to secure border gateway protocol

D Raimagia, S Singh - IJEIR, 2012 - academia.edu
The Secure Border Gateway Protocol (S-BGP) is used when two different Autonomous
System communicate with each other and upon reception of UPDATE from neighbor …

Secure blockchain network communication using SCION

A Vorkapic - 2018 - diva-portal.org
Abstract The paper by Apostolaki, Zohar, and Vanbever [3] describes two routing attacks on
the Bitcoin network, partition attack and delay attack. By isolating parts of the network or …