The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Securing BGP—A literature survey

G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

Accurate real-time identification of IP prefix hijacking

X Hu, ZM Mao - 2007 IEEE Symposium on Security and …, 2007 - ieeexplore.ieee.org
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in
real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network …

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing

A Boldyreva, C Gentry, A O'Neill, DH Yum - Proceedings of the 14th ACM …, 2007 - dl.acm.org
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …

Losing control of the internet: using the data plane to attack the control plane

M Schuchard, A Mohaisen, D Foo Kune… - Proceedings of the 17th …, 2010 - dl.acm.org
In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST,
attack, a distributed denial of service attack that attacks the control plane of the Internet …

On interdomain routing security and pretty secure BGP (psBGP)

PC Oorschot, T Wan, E Kranakis - ACM Transactions on Information and …, 2007 - dl.acm.org
It is well known that the Border Gateway Protocol (BGP), the IETF standard interdomain
routing protocol, is vulnerable to a variety of attacks, and that a single misconfigured or …

Computational and energy costs of cryptographic algorithms on handheld devices

H Rifa-Pous, J Herrera-Joancomartí - Future internet, 2011 - mdpi.com
Networks are evolving toward a ubiquitous model in which heterogeneous devices are
interconnected. Cryptographic algorithms are required for developing security solutions that …

An ID-based aggregate signature scheme with constant pairing computations

KA Shim - Journal of Systems and Software, 2010 - Elsevier
An aggregate signature scheme allows n signatures on n distinct messages from n distinct
users to aggregate a single signature. The main benefit of such schemes is that they allow …

Practical defenses against BGP prefix hijacking

Z Zhang, Y Zhang, YC Hu, ZM Mao - Proceedings of the 2007 ACM …, 2007 - dl.acm.org
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates
an IP prefix that the router does not own, is becoming an increasingly serious security …