StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Routing Protocol Security - Dissertation Example

Cite this document
Summary
The paper “Routing Protocol Security” seeks to examine OSPF v2 Routing protocol Security with a focus on various security measures such as message digest and digital certificate. This would be done using authentication method to compare both of them in order to pinpoint the issues arising from it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Routing Protocol Security
Read Text Preview

Extract of sample "Routing Protocol Security"

Download file to see previous pages

The Pervasive nature of the existing information infrastructure when coupled with cyber terrorism related threats makes the security of the network infrastructure an area of interest for network or computer security researchers. While a significant amount of research has been done on the content of security information, and software development, securing of the network infrastructure has increasingly become an issue of concern over the years.  The key critical infrastructure security entails securing of the routing infrastructure.

According to Jones & Moigne  (2006) abuse of routine protocol and mechanism is perhaps the simplest available protocol-based attack. Recently, the emergence response team highlighted the imminent need for ensuring that routing infrastructure becomes secured (Yasser, 2007). According to Russell (2003) routers are widely used by intruders as common platforms for activity scanning. They are also reported to be less protected by the security policy (Tanenbaum,  2003). For purposes of routing, the infrastructure is often categorized into two domains.

These are inter-domain and intra-domain (IETF, John & Moy, 1998). Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers.. These are inter-domain and intra-domain (IETF, John & Moy, 1998).

Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers within its domain although this does not necessarily include all the links that connect all the intra-domain routers.

Within an automated system, the routing protocols that are most commonly deployed in Autonomous System, are the Open Shortest Path First (OSPF) alongside the Intermediate-System-to-Intermediate System routing protocols. The two protocols are based upon the link-state routing OSPF v2 Routing protocol, which is a link-state routing protocol that was developed purposely for the internet Protocol networks. OSPF is often based upon the relative cost of transferring the information between hops such as the networks and routers.

This protocol is, most often than not, categorized into an interior-Gateway protocol with an intension of running it internally in the AS (Cisco Systems Inc, 2009). This protocol is mostly distributed in the AS amongst various routers and it provides an allowance for building similar representation of the network topology belonging to AS. This is often realized through publishing (LSAs) or Link state Advertisement by routers (Cisco Systems Inc, 2009). The routers then construct a tree of shortest-path to various destinations maintaining itself as a root.

It then routes the IP packets via the internet basing on the IP addresses. If a topological change

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Routing Protocol Security Dissertation Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1475494-routing-protocol-security
(Routing Protocol Security Dissertation Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1475494-routing-protocol-security.
“Routing Protocol Security Dissertation Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1475494-routing-protocol-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Routing Protocol Security

Evaluation of Routing Protocols

The following sections contains advantages and disadvantages of each routing protocol specified along with its administrative distance, metrics, periodic updates, triggered updates, partial updates, VSLM / CIDR subnet masking and algorithms.... The selection of routing protocols emphasize on security, reliability, data transmission carrier, efficiency, and robustness.... As per network dictionary it is defined as “Routing Information protocol (RIP) is a standard for exchange of routing information among gateways and hosts....
8 Pages (2000 words) Essay

Network Organization, Addressing, and Routing Protocols

Name of the Author Name of the Professor Course 10 February 2012 Network Organization, Addressing, and Routing Protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol.... These domains are categorized in six different sections illustrated below: OSPF Network Topology OSPF Addressing and Route Summarization OSPF Route Selection OSPF Convergence OSPF Network Scalability OSPF security In order to achieve the desired objectives, OSPF will ensure data redundancy over the network....
3 Pages (750 words) Research Paper

Routing Protocol Security OSPFv2

Routing Protocol Security OSPFv2 Name Institution Conclusion and Future Recommendations The current research demonstrated quite clearly that a OSPF V2 Routing protocol can be used as an internet security measure.... Although it has been noted that OSPFv3, when running on IPv6, does not any more support the protocol-internal authentication, it relies on the IPv6 protocol security (Tanenbaum, 2003).... The study sought to investigate the Open Shortest Path First (OSPF) as a link-state routing protocol often used in the Internet Protocol (IP) networks....
3 Pages (750 words) Dissertation

Sensor Network Secure Routing Protocols

Ad hoc network protocols like AODV and DSR with all security protocols imposed on them can't discover routes that are longer than 2 hops when subjected to this attack.... This protection provides a provable security feature to weak and even the stronger rushing attackers at no cost provided the underlying protocol does not fail to identify the working route.... However, the wireless sensor network architecture for WSN like any other wireless technology is subjected to a number of security attacks because it uses broadcast way of a transmission channel....
18 Pages (4500 words) Coursework

Wireless Network Security

For example, Destination Sequenced Distance Vector (DSDV) and Wireless routing protocol (WRP) protocols fall under the category of table-driven protocols.... Demand-driven protocols are associated with AODV and dynamic source routing protocol (DSR).... The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET.... However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security....
7 Pages (1750 words) Essay

The Outstanding Networks Relative to Traditional IP Networks

Such a discussion availed the avenue critically to investigate the effects of interior gateways routing protocol.... Moreover, the authors should be lauded because they gave specifications of the twin routing protocol for the present study.... The aim will hence guide… In addition, that aim is precise and will help the researcher solely focus on the MPLS VPN technology. How can MPLS VPN backbone be modelled to solve the shortcomings associated with Traditional IP-based networks, ATM networks and Frame Relay in the management of enormously large networks like scalability flexibility, security, and cost?...
5 Pages (1250 words) Assignment

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet protocol security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... PSec is considered as a framework of open standards with the major objective of protecting and securing the communication between different networks through encrypting security services....
8 Pages (2000 words) Research Paper

Transmission Control Protocol and User Datagram Protocol

… The paper "Transmission Control protocol and User Datagram protocol" is a brilliant example of an assignment on logic and programming.... Transmission Control protocol (TCP) is a set of protocols or rules that are used with Internet protocol to send data interns of units or packets between computers that are interconnected or over the Internet.... The paper "Transmission Control protocol and User Datagram protocol" is a brilliant example of an assignment on logic and programming....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us