[HTML][HTML] Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures

M Kowalski, W Mazurczyk - Computer Networks, 2023 - Elsevier
Background: The inter-domain routing security is often based on trust, which, as seen in
practice, is an insufficient approach. Due to the deficit of native security controls in the …

Secure inter-domain routing based on blockchain: A comprehensive survey

L Mastilak, P Helebrandt, M Galinski, I Kotuliak - Sensors, 2022 - mdpi.com
The whole Internet consists of thousands of autonomous systems that transfer data with one
another. The BGP plays a significant role in routing, but its behaviour is essentially naive …

[PDF][PDF] Bgp-isec: Improved security of internet routing against post-rov attacks

C Morris, A Herzberg, B Wang… - Network and Distributed …, 2024 - researchgate.net
We present BGP-iSec, an enhancement of the BGP-sec protocol for securing BGP, the
Internet's inter-domain routing protocol. BGP-iSec ensures additional and stronger security …

The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

IRR Hygiene in the RPKI Era

B Du, G Akiwate, T Krenc, C Testart, A Marder… - … Conference on Passive …, 2022 - Springer
Abstract The Internet Route Registry (IRR) and Resource Public Key Infrastructure (RPKI)
both emerged as different solutions to improve routing security in the Border Gateway …

RPKI 去中心化安全增强技术综述

秦超逸, 张宇, 方滨兴 - 通信学报, 2024 - infocomm-journal.com
资源公钥基础设施(RPKI) 搭建了中心层级化的IP 地址资源认证基础设施.
在增强互联网域际路由系统安全的同时, RPKI 也将中心性引入路由系统 …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment

N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called
AS employs invalid routes. Recently, a data object called Autonomous System Provider …

Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game Perspective

M Zeng, X Huang, P Zhang, D Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Resource Public Key Infrastructure (RPKI) defends against BGP prefix hijacking by signing
Route Origin Authorizations (ROAs) and filtering malicious BGP routes with ROAs. However …

Towards blockchain-based secure BGP routing, challenges and future research directions

Q Yang, L Ma, S Tu, S Ullah, M Waqas… - … Materials and Continua, 2024 - gala.gre.ac.uk
Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet
that conveys network layer reachability information and establishes routes to different …