P Yue, J An, J Zhang, G Pan, S Wang, P Xiao… - Authorea …, 2023 - techrxiv.org
On the Security of LEO Satellite Communication Systems: Vulnerabilities, Countermeasures, and Future Trends Page 1 P osted on 11 Jan 2020 — CC-BY-NC-SA 4 — h ttps://doi.org/10.36227/techrx …
Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to- peer network to send and receive transactions. It is critical that a client is connected to at …
G He, W Su, S Gao, N Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Multi-domain networking slice orchestration is an essential technology for the programmable and cloud-native 5G network. However, existing research solutions are either based on the …
M Kowalski, W Mazurczyk - Computer Networks, 2023 - Elsevier
Background: The inter-domain routing security is often based on trust, which, as seen in practice, is an insufficient approach. Due to the deficit of native security controls in the …
The whole Internet consists of thousands of autonomous systems that transfer data with one another. The BGP plays a significant role in routing, but its behaviour is essentially naive …
M Karakus - IEEE Access, 2024 - ieeexplore.ieee.org
As a result of the ubiquitous network applications and services, exacerbated by the overarching digital revolution the need and demand for efficient and dependable …
The longest-chain and Greedy Heaviest Observed Subtree (GHOST) protocols are the two most famous chain-selection protocols to address forking in Proof-of-Work (PoW) blockchain …
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …
Abstract Border Gateway Protocol (BGP), the default inter-domain routing protocol on the Internet, lacks inherent mechanisms to validate the prefix ownership and integrity of inter …