{"title":"Automated Key Management for Router Updates","authors":"J. Atwood","doi":"10.1109/EMERGING.2009.23","DOIUrl":null,"url":null,"abstract":"Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it not be altered en route, i.e., the inter-router communication has to be secure. This requires, in turn, an architecture for managing the necessary security associations and keying material within an administrative region. After reviewing current work and existing security tools, a proposal is made for a novel architecture to manage the router updates. The operations within this architecture are detailed, and its advantages are explained.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 First International Conference on Emerging Network Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMERGING.2009.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it not be altered en route, i.e., the inter-router communication has to be secure. This requires, in turn, an architecture for managing the necessary security associations and keying material within an administrative region. After reviewing current work and existing security tools, a proposal is made for a novel architecture to manage the router updates. The operations within this architecture are detailed, and its advantages are explained.