Essays about: "secure routing"
Showing result 1 - 5 of 17 essays containing the words secure routing.
-
1. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE
-
2. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE
-
3. Securing BGP using blockchain technology
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Border Gateway Protocol (BGP) is an important routing protocol used to exchangerouting information among autonomous systems on the Internet. The BGP version 4 doesnot include specific protection mechanisms against attacks or deliberate errors that couldcause disruptions of routing behavior. READ MORE
-
4. Secure Blockchain Network Communication using SCION
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The paper by Apostolaki, Zohar, and Vanbever [3] describes two routing attacks on the Bitcoin network, partition attack and delay attack. By isolating parts of the network or delaying block propagation, a significant amount of mining power could be wasted, resulting in revenue loss and a wide range of exploits could be enabled, such as double spending. READ MORE
-
5. Evaluation of Cryptographic CRC in 65nm CMOS
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconnected to provide various services appealing to users. Many devices will get an access to valuable information which is likely to increase the number of malicious attacks on these devices in the future. READ MORE