14.4. Threats and Countermeasures in Link-State Routing
14.4.1. Link-State Routing Model and Threat Model
In this section, our discussion focuses on the origination, verification, and transmission of routing data. We start with a brief description of link-state routing and security threats specific to it. We discuss the security mechanisms that are known, as of now, to prevent some of these threat actions from taking place. Furthermore, we discuss the vulnerabilities of existing network routing security mechanisms and the improvements that can be done by using stronger authentication and a new method to manage routing data through encryption.
Link-State Routing Model
The link-state routing model is composed of physical entities (routers and ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.