Integration of security in network routing protocols

  • Kumar B
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.

Cite

CITATION STYLE

APA

Kumar, B. (1993). Integration of security in network routing protocols. ACM SIGSAC Review, 11(2), 18–25. https://doi.org/10.1145/153949.153953

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free