Secure Link State Routing Protocol: A Framework for Network Survivability


Download Links

by Dijiang Huang , Amit Sinha , Deep Medhi

Active Bibliography

Trust Analysis of Link State Network Routing – Dijiang Huang Deep, Dijiang Huang, Deep Medhi, Cory Beard, Lein Harn
1 Addressing intra-domain network security issues through secure link-state routing protocol: A new architectural framework,” accepted by Communications of The ACM – Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory Beard X, Lein Harn, Deep Medhi - 2006
SDV: A new approach to Secure Distance Vector routing protocols – A. Babakhouya, Y. Challal, M. Bouabdallah, S. Gharout - 2009
1 A Scalable Method for Router Attack Detection and Location in Link State Routing – Anirban Chakrabarti, G. Manimaran - 2002
1 Descartes BGP: A Conflict Detection and Response Framework for Inter-domain Routing – Earl Barr , Dimitri DeFigueiredo, Martin O. Nicholes, Shih Ming Tseng, Chen-Nee Chuah , Biswanath Mukherjee , S. Felix Wu - 2006
10 Routing with byzantine robustness – Radia Perlman, Radia Perlman - 2005
21 Fractal Merkle Tree Representation and Traversal – Markus Jakobsson, Tom Leighton, Silvio Micali, Michael Szydlo - 2003
20 Merkle tree traversal in log space and time – Michael Szydlo - 2004
1 Merkle Tree Traversal in Log Space and Time (2003 Preprint version) – Michael Szydlo
1 A key distribution scheme for double authentication in link-state routing protocol – Dijiang Huang, Amit Sinha, Deep Medhi - 2005
WSEAS TRANSACTIONS on COMMUNICATIONS Su-Kit Tang, Kin-Yeung Wong, Kai-Hau Yeung Record Path Header for Triangle Routing Attacks in IPv6 Networks – Su-kit Tang, Kin-yeung Wong, Rua Luis, Gonzaga Gomes, Macao Sar
51 Beware of BGP Attacks – Ola Nordström, Constantinos Dovrolis - 2004
24 Efficient and Secure Network Routing Algorithms. provisional patent filing – Michael T. Goodrich - 2001
9 Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts – Michael T. Goodrich - 2005
IP Security – Madalina Baltatu, Antonio Lioy - 2000
7 A key-chain based keying scheme for many-to-many secure group communication – Dijiang Huang, Deep Medhi - 2004
TESLA: Multicast Source Authentication Transform Introduction STATUS OF THIS MEMO – unknown authors - 2004
11 Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction", RFC 4082 – A. Perrig, D. Song, R. Canetti, J. D. Tygar, B. Briscoe - 2005
Network Working Group J. Moy Request for Comments: 2329 Ascend Communications, Inc. Category: Informational April 1998 OSPF Standardization Report – Status Of This