Security Analysis

  • Adrian Perrig
  • Pawel Szalachowski
  • Raphael M. Reischuk
  • Laurent Chuat
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

Evaluating the security of a network architecture, including its routing protocols and supporting infrastructure, is an ambitious undertaking. Indeed, the security guarantees afforded by the architecture, as well as the security of the architecture itself, depend on a number of factors. For example, should we assume correct implementation and configuration of the protocol at all deploying nodes? Do we consider an adversary that can eavesdrop on a large portion of network links? Can malware on end hosts send arbitrary traffic?

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Adrian Perrig
    • 1
  • Pawel Szalachowski
    • 2
  • Raphael M. Reischuk
    • 3
  • Laurent Chuat
    • 4
  1. 1.Network Security Group, CAB F 85.1ETH ZürichZürichSwitzerland
  2. 2.Network Security Group, CAB F 85.2ETH ZürichZürichSwitzerland
  3. 3.Network Security Group, CAB F 83ETH ZürichZürichSwitzerland
  4. 4.Network Security Group, CAB F 86.1ETH ZürichZürichSwitzerland

Personalised recommendations