INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 314    Submit Your Rating     Cite This   Download        Certificate

DESIGNING, IMPLEMENTATION & SECURITY ISSUES OF ROUTING PROTOCOLS

    2 Author(s):  JEEVAN PRASAD ADHIKARI , DR. RABINDRA DAS

Vol -  4, Issue- 1 ,         Page(s) : 143 - 150  (2014 ) DOI : https://doi.org/10.32804/RJSET

Abstract

With the growing use of the Internet infrastructure for commercial applications, the demand for quality of service has rapidly increased. Hence, wireless Sensor Networks (WSN) are emerging as both an important new tier in the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors. Ad hoc networks are simple peer-to-peer networks, self-organized and with no fixed infrastructure hence the Adhoc networks are more easily attacked than a wired network. They are used in the military oriented tactical operations, for emergency law enforcement, and in rescue missions. Confidentiality, integrity, availability, non-repudiation and the authentication are the basic requirements of the information security. Reachability information is shared between the routers by the routing protocols. As traffic is received at a router, it is forwarded based on the reachability information stored in the router’s forwarding table, and the other information stored in the packet’s header.

1. Antonio Laganà (2004). Computational Science and Its Applications, Available at: https://books.google.co.in/books?isbn=3540220542
2. Subharthi Paul, Jianli Pan and Raj Jain (2011). Architectures for the future networks and the next generation Internet: A survey, Computer Communications 34 (2011) 2–42
3. Kevin Butler (2005). A Survey of BGP Security, Draft Version, Vol. V, No. N, April 2005, Pages 1–35
4. S. Misra et al. (2009). Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag London Limited 2009.
5. Keith Stouffer, Joe Falco and Karen Kent (2007). Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Special Publication 800-82 INITIAL PUBLIC DRAFT
6. Generic Threats to Routing Protocols, 2006, Available at: https://tools.ietf.org/html/rfc4593
7. Sean Convery and Matthew Franz, BGP Vulnerability Testing: Separating Fact from FUD v1.1, Available at: http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz-v3.pdf
8. Huaizhi Li, Zhenliu Chen and Xiangyang Qin (2002). Secure Routing in Wired Networks and Wireless Ad Hoc Networks, Available at: http://web.cse.msstate.edu/~ramkumar/N3-Pilate.pdf
9. DA Maltz (2004). Routing design in operational networks - ACM Digital Library, Available at: dl.acm.org/citation.cfm?id=1015472
10. Geoffrey Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert Greenberg, Gísli Hjálmtýsson (2004). Routing design in operational networks, Available at: http://thirdworld.nl/routing-design-in-operational-networks
11. Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford (2008). A Survey of BGP Security Issues and Solutions,  Available at: https://www.cs.princeton.edu/~jrex/papers/bgp-security08.pdf
12. Xin Hu and Z. Morley Mao (2007). Accurate Real-time Identification of IP Hijacking, Available at: http://web.eecs.umich.edu/~zmao/Papers/iphijack.pdf
13. Kalu Okpo Ume (2012). BGP Simulation, Available at: https://www.theseus.fi/bitstream/handle/10024/48839/BGP%20SIMULATION.pdf?sequence=1

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details