PASER: Secure and efficient routing approach for airborne mesh networks

M Sbeiti, N Goddemeier, D Behnke… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Low-altitude unmanned aerial vehicles (UAVs) combined with WLAN mesh networks
(WMNs) have facilitated the emergence of airborne network-assisted applications. In …

Rfc 6830: The locator/id separation protocol (lisp)

D Farinacci, V Fuller, D Meyer, D Lewis - 2013 - dl.acm.org
This document describes a network-layer-based protocol that enables separation of IP
addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators …

Performance comparative analysis between ARAN and SAODV on VANET facing the blackhole

MA Nugraha, DW Sudiharto… - … Conference on Electrical …, 2017 - ieeexplore.ieee.org
Vehicular Ad-Hoc Network (VANET) is a network technology which uses vehicles as mobile
nodes to form a communication network. In order to communicate, all vehicles have to use …

Secure receiver access control for IP multicast at the network level: Design and validation

B Li, JW Atwood - Computer Networks, 2016 - Elsevier
The classical service model of IP multicast is open; anyone can receive multicast data. When
using this model, it is impossible to ensure that receivers are authorized to receive the data …

Router authentication, key management, and adjacency management for securing inter-router control messages

RB Somanatha, JW Atwood - Computer Networks, 2015 - Elsevier
To build secure network-based systems, it is important to ensure the authenticity and
integrity of the inter-router control message exchanges. Authenticating neighbors and …

A security framework for routing protocols

N Prajapati - 2014 - spectrum.library.concordia.ca
With the rise in internet traffic surveillance and monitoring activities, the routing infrastructure
has become an obvious target of attack as compromised routers can be used to stage large …

Security Analysis of Multicast/Unicast Router Key Management Protocols

Y Huang, JW Atwood - 2018 IEEE Canadian Conference on …, 2018 - ieeexplore.ieee.org
Key Management Protocols (KMPs) are intended to manage cryptographic keys in a
cryptosystem. KMPs have been standardized for Internet Protocol Security (IPsec), and …

[PDF][PDF] Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status: Standards Track A. Mishra Expires: May 25, 2018 O3b Networks

A Saxena, M Bhatia, OBFD Authentication - 2017 - watersprings.org
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status:
Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …

[PDF][PDF] Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status: Standards Track A. Mishra Expires: December 29, 2017 O3b Networks

A Saxena, M Bhatia, OBFD Authentication - 2017 - bme.hu
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status:
Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …

[PDF][PDF] Optimizing BFD Authentication draft-ietf-bfd-optimizing-authentication-01

M Bhatia - 2016 - watersprings.org
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status:
Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …