Detecting bogus BGP route information: Going beyond prefix hijacking

J Qiu, L Gao, S Ranjan, A Nucci - 2007 Third International …, 2007 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of the Internet.
However, the BGP system has been built based on the implicit trust among individual …

How secure are secure interdomain routing protocols

S Goldberg, M Schapira, P Hummon… - ACM SIGCOMM Computer …, 2010 - dl.acm.org
In response to high-profile Internet outages, BGP security variants have been proposed to
prevent the propagation of bogus routing information. To inform discussions of which variant …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

CCAP: a complete cross-domain authentication based on blockchain for Internet of Things

F Tong, X Chen, K Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The increasing diversity of Internet-of-Things (IoT) application scenarios and explosive
growth of access devices have brought more frequent exchanges of resources between …

An analysis of routing attacks against IOTA cryptocurrency

P Perazzo, A Arena, G Dini - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
IOTA is a new type of distributed ledger designed for allowing fee-less and rate-scalable
micropayments in Internet of Things applications. Security research on IOTA has focused …

Beware of BGP attacks

O Nordström, C Dovrolis - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
This note attempts to raise awareness within the network research community about the
security of the interdomain routing infrastructure. We identify several attack objectives and …

Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: A survey

FH Pohrmen, RK Das, G Saha - Transactions on Emerging …, 2019 - Wiley Online Library
Blockchain is a key technology that enables cryptocurrencies such as Bitcoin, Litecoin, etc.
In recent years, researchers have ventured into tapping the potential of blockchain‐based …

Creating a secure underlay for the internet

H Birge-Lee, J Wanner, GH Cimaszewski… - 31st USENIX Security …, 2022 - usenix.org
Adversaries can exploit inter-domain routing vulnerabilities to intercept communication and
compromise the security of critical Internet applications. Meanwhile the deployment of …

Sok: Security and privacy of blockchain interoperability

A Augusto, R Belchior, M Correia, A Vasconcelos… - Authorea …, 2023 - techrxiv.org
Recent years have witnessed significant advancements in cross-chain technology.
However, the field faces two pressing challenges when it comes to security and privacy …

Sok: Not quite water under the bridge: Review of cross-chain bridge hacks

SS Lee, A Murashkin, M Derka… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The blockchain ecosystem has evolved into a multi-chain world with various blockchains
vying for use. Although each blockchain may have its own native cryptocurrency or digital …