Routing Security Using Blockchain Technology

M Gómez, P Bazán, N Río, M Morandi - … on Cloud Computing, Big Data & …, 2021 - Springer
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than
any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol …

Routing Security Using Blockchain Technology

M Morandi - Cloud Computing, Big Data & Emerging Topics - Springer
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than
any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol …