This memo describes the extensions to OSPF required to add digital signature authentication to Link State data, and to provide a certification mechanism for router data. Added LSA processing and key management is detailed. A method for migration from, or co- existence with, standard OSPF V2 is described.
RFC Downloads
Cited By
- Compagno A, Zeng X, Muscariello L, Carofiglio G and Augé J Secure producer mobility in information-centric network Proceedings of the 4th ACM Conference on Information-Centric Networking, (163-169)
- Niari S and Jahangir A Verification of OSPF vulnerabilities by colored Petri net Proceedings of the 6th International Conference on Security of Information and Networks, (102-109)
- Huang D, Cao Q, Sinha A, Schniederjans M, Beard C, Harn L and Medhi D (2006). New architecture for intra-domain network security issues, Communications of the ACM, 49:11, (64-72), Online publication date: 1-Nov-2006.
- Ateniese G, Chou D, de Medeiros B and Tsudik G Sanitizable signatures Proceedings of the 10th European conference on Research in Computer Security, (159-177)
- Raffo D, Adjih C, Clausen T and Mühlethaler P An advanced signature system for OLSR Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, (10-16)
- Yi S, Naldurg P and Kravets R Security-aware ad hoc routing for wireless networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (299-302)
- Partridge C, Snoeren A, Strayer W, Schwartz B, Condell M and Castiñeyra I (2019). FIRE, ACM SIGCOMM Computer Communication Review, 30:4, (191-203), Online publication date: 1-Oct-2000.
- Partridge C, Snoeren A, Strayer W, Schwartz B, Condell M and Castiñeyra I FIRE Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (191-203)
Recommendations
Security Arguments for Digital Signatures and Blind Signatures
Since the appearance of public-key cryptography in the seminal Diffie--Hellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for several years ...
Design of DL-based certificateless digital signatures
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate ...
Generic security-amplifying methods of ordinary digital signatures
Digital signatures are one of the most fundamental primitives in cryptography. In this paper, three new paradigms are proposed to obtain signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in ...