The Border Gateway Protocol possesses security vulnerabilities, because speakers can lie. Proposed security protocols can address the vulnerabilities, but can significantly increase the performance overheads, which prevent their real-world deployment. Public key cryptography can address these vulnerabilities. We report our research into analyzing recently proposed security protocols and building simulation frameworks to evaluate their costs, and designing and validating techniques to reduce them.
ASJC Scopus subject areas
- Information Systems
- Hardware and Architecture
- Computer Networks and Communications