{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:01:29Z","timestamp":1757592089951},"reference-count":19,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,12]]},"DOI":"10.1016\/s1389-1286(00)00159-6","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"881-894","source":"Crossref","is-referenced-by-count":15,"title":["Security issues in control, management and routing protocols"],"prefix":"10.1016","volume":"34","author":[{"given":"Madalina","family":"Baltatu","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Maino","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Mazzocchi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/S1389-1286(00)00159-6_BIB1","doi-asserted-by":"crossref","DOI":"10.1016\/S1389-1286(98)00022-X","article-title":"Lowering security overhead in link state routing","volume":"31","author":"Hauser","year":"1999","journal-title":"Computer Networks"},{"issue":"2","key":"10.1016\/S1389-1286(00)00159-6_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/378444.378449","article-title":"Security problems in the TCP\/IP protocol suite","volume":"19","author":"Bellovin","year":"1989","journal-title":"ACM Computer Communications Review"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB3","doi-asserted-by":"crossref","unstructured":"W. Simpson, ICMP Domain Name Messages, RFC 1788, April 1995","DOI":"10.17487\/rfc1788"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB4","doi-asserted-by":"crossref","unstructured":"S. Derring, ICMP Router Discovery Messages, RFC 1256, September 1991","DOI":"10.17487\/rfc1256"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB5","doi-asserted-by":"crossref","unstructured":"P. Kern, W. Simpson, ICMP Security Failure Messages, RFC 2521, March 1999","DOI":"10.17487\/rfc2521"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB6","doi-asserted-by":"crossref","unstructured":"J. Postel, Internet Control Message Protocol, RFC 792, 1981","DOI":"10.17487\/rfc0792"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB7","doi-asserted-by":"crossref","unstructured":"W. Fenner, Internet Group Management Protocol, Version 2, RFC 2236, November 1997","DOI":"10.17487\/rfc2236"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB8","doi-asserted-by":"crossref","unstructured":"P. Ferguson, D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, RFC 2267, January 1998","DOI":"10.17487\/rfc2267"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB9","doi-asserted-by":"crossref","unstructured":"J. Moy, OSPF Version 2, RFC 2328, April 1998","DOI":"10.17487\/rfc2328"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB10","doi-asserted-by":"crossref","unstructured":"S. Murphy, B. Wellington, OSPF with Digital Signatures, RFC 2154, June 1997","DOI":"10.17487\/rfc2154"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB11","doi-asserted-by":"crossref","unstructured":"R. Braden, Requirements for Internet Hosts-Communication Layers, RFC 1122, 1989","DOI":"10.17487\/rfc1122"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB12","doi-asserted-by":"crossref","unstructured":"F. Baker, R. Atkinson, RIP-2 MD5 Authentication, RFC 2082, January 1997","DOI":"10.17487\/rfc2082"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB13","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, November 1998","DOI":"10.17487\/rfc2401"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB14","doi-asserted-by":"crossref","unstructured":"D. Harkins, D. Carrell, The Internet Key Exchange (IKE), RFC 2409, November 1998","DOI":"10.17487\/rfc2409"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB15","unstructured":"R. Perlman, Network layer protocols with byzantine robustness, Ph.D. Thesis, Department of Electrical Engineering and Computer Science, MIT Press, Cambridge, MA, August 1988"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB16","unstructured":"CA-96.26 Denial-of-Service Attack via ping, CERT Coordination Center, http:\/\/www.cert.org\/, 1996"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB17","doi-asserted-by":"crossref","unstructured":"CA-98.01 `smurf' IP Denial-of-Service Attacks, CERT Coordination Center, http:\/\/www.cert.org\/, 1998","DOI":"10.1016\/S1353-4858(98)90152-0"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB18","unstructured":"IETF IPsec mailing list, ipsec@lists.tislabs.com, October 1999"},{"key":"10.1016\/S1389-1286(00)00159-6_BIB19","unstructured":"LOpht Security Advisory, http:\/\/www.LOpht.com\/advisories.html, August 1999"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001596?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001596?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T16:59:01Z","timestamp":1578934741000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600001596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2000,12]]}},"alternative-id":["S1389128600001596"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00159-6","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12]]}}}