Sciweavers

259 search results - page 7 / 52
» A Secure Routing Protocol for Peer-to-Peer Network
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
WS
2003
ACM
14 years 17 days ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
WISEC
2009
ACM
14 years 2 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
NDSS
1997
IEEE
13 years 11 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
SIGCOMM
2004
ACM
14 years 22 days ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu