

Author: He L.
Publisher: Springer Publishing Company
ISSN: 1358-3948
Source: BT Technology Journal, Vol.24, Iss.4, 2006-10, pp. : 180-196
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Routing protocols distribute network topology information around the routers of a network. They are part of the critical network infrastructure, but are vulnerable to both internal and external attacks. In this paper, different routing protocols are first introduced, followed by reviews of routing protocol security publications in academia and industry. The general vulnerabilities and threats of routing protocols are then analysed. The two major protection countermeasures for both link-state routing protocols and distance-vector routing protocols are presented in detail. The popular hacking tools which can be used directly or customised to launch attacks are described. The product vendors of routing protocol security and the best practice adopted by network carriers and ISPs are investigated. The paper aims to provide an overview of Internet routing protocol security, and highlight areas for further research.
Related content


An overview of Internet protocols
By O'Neill A. Tatham R. Carter S. Tsirtsis G. Dann A.
BT Technology Journal, Vol. 16, Iss. 1, 1998-01 ,pp. :


A Query Scope Agent for Flood Search Routing Protocols
By Sucec J.
Wireless Networks, Vol. 9, Iss. 6, 2003-11 ,pp. :


A review of routing protocols for mobile ad hoc networks
By Abolhasan M. Wysocki T. Dutkiewicz E.
Ad Hoc Networks, Vol. 2, Iss. 1, 2004-01 ,pp. :


A shared secret-based algorithm for securing the OLSR routing protocol
By Fourati Alia
Telecommunication Systems, Vol. 31, Iss. 2-3, 2006-03 ,pp. :