The hanging ROA: A secure and scalable encoding scheme for route origin authorization

Y Li, H Zou, Y Chen, Y Xu, Z Ma, D Ma… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
On top of the Resource Public Key Infrastructure (RPKI), the Route Origin Authorization
(ROA) creates a cryptographically verifiable binding of an autonomous system to a set of IP …

RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI

W Li, Z Lin, MI Ashiq, E Aben, R Fontugne… - Proceedings of the …, 2023 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a system to add security to the Internet
routing. In recent years, the publication of Route Origin Authorization (ROA) objects, which …

Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis.

Z Lai, Z Yan, G Geng… - International Journal of …, 2024 - search.ebscohost.com
Abstract Resource Public Key Infrastructure (RPKI) is a solution to mitigate the security
issues faced by inter-domain routing. Within the RPKI framework, Route Origin Authorization …

Comp-RPKI: A Decentralized Protocol for Full Route Origin Validation

Y Wu, Y Wang, J DeJulius, R Abboud… - … Conference on Big …, 2023 - ieeexplore.ieee.org
The Resource Public Key Infrastructure (RPKI) is an essential technology for securing the
Border Gateway Protocol (BGP) routing on the Internet. Although the global RPKI-ROV …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

Smart RPKI validation: Avoiding errors and preventing hijacks

T Hlavacek, H Shulman, M Waidner - European Symposium on Research …, 2022 - Springer
Abstract Resource Public Key Infrastructure (RPKI) was designed to authorize ownership of
prefixes in the Internet, which routers use to filter bogus BGP announcements to prevent …

Exploring the benefit of path plausibility algorithms in BGP

N Rodday, GD Rodosek, A Pras… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is known to have several security weaknesses. Two
major threats are BGP prefix hijacking and BGP route leaks. A hijack refers to the illegitimate …

ROAchain: Securing route origin authorization with blockchain for inter-domain routing

G He, W Su, S Gao, J Yue… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The inter-domain routing with BGP is highly vulnerable to malicious attacks, due to the lack
of a secure means of verifying authenticity and legitimacy of inter-domain routes. Resource …

Poster: Insights into global deployment of RPKI validation

H Shulman, N Vogel, M Waidner - … of the 2022 ACM SIGSAC Conference …, 2022 - dl.acm.org
IP prefix hijacks, due to malicious attacks or benign misconfigurations, pose a threat to the
Internet's stability and security. RPKI was designed to enable networks to block prefix hijacks …

[PDF][PDF] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.

W Chen, Z Wang, D Han, C Duan, X Yin, J Yang, X Shi - NDSS, 2022 - researchgate.net
Securing inter-domain routing systems of the Internet from illegitimate prefix annoucements
has been a great concern for the researchers and network operators. After the failure of …