Analiza bezbednosnih mehanizama OSPF protokola

by   P. D. Bojovic, et al.

The security of the service and the system depends on the security of each of them components of this system. An attack on the routing protocol may be inaccurate functioning of the computer network. In some cases this is possible The attacker comes to data or artificial information for which he is not entitled. OSPF protocol is the most commonly used connection protocol. U In this paper, we conducted an OSPF security analysis and described it security mechanisms. ----- Bezbednost nekog servisa i sistema zavisi od bezbednosti svake komponente tog sistema. Napad na protokol rutiranja može proizvesti neispravno funkcionisanje računarske mreže. U pojedinim slučajevima moguće je da napadač doe do podataka ili umetne podatke za koje nema pravo. OSPF protokol je najrasprostranjeniji protokol stanja linka (link-state protocol). U ovom radu izvršili smo analizu bezbednosti OSPF protokola i opisali njegove bezbednosne mehanizme.


Quality of Service-aware Security Framework for Mobile Ad hoc Networks using Optimized Link State Routing Protocol

All networks must provide an acceptable and desirable level of Quality o...

Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN

Wireless body area network(WBAN) is becoming more popular in recent year...

Charting the Security Landscape of Programmable Dataplanes

Emerging programmable dataplanes will revamp communication networks, all...

Security issues in a group key establishment protocol

Major shortcomings in a recently published group key establishment proto...

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...

Security and Performance Considerations in ROS 2: A Balancing Act

Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to supp...

Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing

Key establishment is one fundamental issue in wireless security. The wid...