Abstract
There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.
Cite
CITATION STYLE
Kumar, B. (1993). Integration of security in network routing protocols. ACM SIGSAC Review, 11(2), 18–25. https://doi.org/10.1145/153949.153953
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.