{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:12Z","timestamp":1761611412045,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T00:00:00Z","timestamp":1484611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2017,1,17]]},"abstract":"<jats:p>A secure routing protocol represents a foundational building block of a dependable communication system. Unfortunately, currently no taxonomy exists to assist in the design and analysis of secure routing protocols. Based on the Dagstuhl Seminar 15102, this paper initiates the study of more structured approaches to describe secure routing protocols and the corresponding attacker models, in an effort to better understand existing secure routing protocols, and to provide a framework for designing new protocols. We decompose the routing system into its key components based on a functional model of routing. This allows us to classify possible attacks on secure routing protocols. Using our taxonomy, we observe that the most eective attacks target the information in the control plane. Accordingly, unlike classic attackers whose capabilities are often described in terms of computation complexity we propose to classify the power of an attacker with respect to the reach, that is, the extent to which the attacker can influence the routing information indirectly, beyond the locations under its direct control.<\/jats:p>","DOI":"10.1145\/3041027.3041033","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T13:13:59Z","timestamp":1484745239000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Toward a Taxonomy and Attacker Model for Secure Routing Protocols"],"prefix":"10.1145","volume":"47","author":[{"given":"Matthias","family":"Hollick","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[{"name":"Northeastern University, USA"}]},{"given":"Panagiotis","family":"Papadimitratos","sequence":"additional","affiliation":[{"name":"KTH, Sweden"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH, Switzerland"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2017,1,17]]},"reference":[{"volume-title":"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/netis-routers-leave-wide-open-backdoor\/","year":"2014","key":"e_1_2_1_1_1","unstructured":"Netis routers leave wide open backdoor. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/netis-routers-leave-wide-open-backdoor\/ , 2014 . Netis routers leave wide open backdoor. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/netis-routers-leave-wide-open-backdoor\/, 2014."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_2_1_3_1","first-page":"4593","article-title":"Generic threats to routing protocols","author":"Barbir A.","year":"2006","unstructured":"A. Barbir , S. Murphy , and Y. Yang . Generic threats to routing protocols . Request for Comments 4593 , 2006 . A. Barbir, S. Murphy, and Y. Yang. Generic threats to routing protocols. Request for Comments 4593, 2006.","journal-title":"Request for Comments"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_2_1_5_1","volume-title":"Proc. ACM SIGCOMM","author":"Chan H.","year":"2006","unstructured":"H. Chan , D. Dash , A. Perrig , and H. Zhang . Modeling adoptability of secure BGP protocols . In Proc. ACM SIGCOMM , Sept. 2006 . H. Chan, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure BGP protocols. In Proc. ACM SIGCOMM, Sept. 2006."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833877"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851195"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"e_1_2_1_11_1","volume-title":"Black Hat USA","author":"Lindner F.","year":"2009","unstructured":"F. Lindner . Cisco ios router exploitation . Black Hat USA , 2009 . F. Lindner. Cisco ios router exploitation. Black Hat USA, 2009."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.135"},{"key":"e_1_2_1_14_1","first-page":"193","volume-title":"SCS CNDS","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. Haas . Secure Routing for Mobile Ad Hoc Networks . In SCS CNDS , pages 193 - 204 , San Antonio, TX, USA , January 2002 . P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS CNDS, pages 193-204, San Antonio, TX, USA, January 2002."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2006.4374344"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1276605"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.17"},{"key":"e_1_2_1_19_1","volume-title":"InfoWorld","author":"Snyder B.","year":"2014","unstructured":"B. Snyder . Snowden : The nsa planted backdoors in cisco products . InfoWorld , 2014 . B. Snyder. Snowden: The nsa planted backdoors in cisco products. InfoWorld, 2014."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041027.3041033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041027.3041033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:31Z","timestamp":1750215811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041027.3041033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,17]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1,17]]}},"alternative-id":["10.1145\/3041027.3041033"],"URL":"https:\/\/doi.org\/10.1145\/3041027.3041033","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2017,1,17]]},"assertion":[{"value":"2017-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}