2021
DOI: 10.1109/tnsm.2020.3015557
|View full text |Cite
|
Sign up to set email alerts
|

ROAchain: Securing Route Origin Authorization With Blockchain for Inter-Domain Routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 42 publications
0
6
0
1
Order By: Relevance
“…2) Hijacking: There have been numerous contributions on dealing with the issues of hijacking [41]- [43]. Yi et al [41] studied the vulnerability of intelligent early warning technology in the context of IoT networks.…”
Section: Related Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…2) Hijacking: There have been numerous contributions on dealing with the issues of hijacking [41]- [43]. Yi et al [41] studied the vulnerability of intelligent early warning technology in the context of IoT networks.…”
Section: Related Contributionsmentioning
confidence: 99%
“…Vieira et al [42] conceived an architecture for automated intrusion detection based on Big Data, with a special emphasis on the classification, understanding, and prediction of behavioral irregularities in distributed computing environments. He et al [43] proposed a novel blockchain-based technique, which eliminated the security risks of a public key infrastructure. Hence it was robust against prefix hijacking attacks.…”
Section: Related Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are studies [7], [14], [15] based on blockchain to prevent route leaks. In the blockchain, ASes share their relationships and store them in blocks.…”
Section: Route Leaks Detectionmentioning
confidence: 99%
“…However, their inference techniques still suffer errors on partial critical links [12]. Studies like [7], [14], [15], [16] do not consider the privacy of AS relationship well and require deployers directly revealing AS relationship information, which makes the deployment hard to proceed.…”
Section: Introductionmentioning
confidence: 99%