{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:07:18Z","timestamp":1704931638639},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2013]]},"DOI":"10.1587\/transcom.e96.b.1742","type":"journal-article","created":{"date-parts":[[2013,6,30]],"date-time":"2013-06-30T22:54:48Z","timestamp":1372632888000},"page":"1742-1752","source":"Crossref","is-referenced-by-count":1,"title":["SIR: A Secure Identifier-Based Inter-Domain Routing for Identifier\/Locator Split Network"],"prefix":"10.23919","volume":"E96.B","author":[{"given":"Yaping","family":"LIU","sequence":"first","affiliation":[{"name":"School of Computer, National University of Defense Technology"}]},{"given":"Zhihong","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Computer, National University of Defense Technology"}]},{"given":"Baosheng","family":"WANG","sequence":"additional","affiliation":[{"name":"School of Computer, National University of Defense Technology"}]},{"given":"Qianming","family":"YANG","sequence":"additional","affiliation":[{"name":"School of Computer, National University of Defense Technology"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R. Moskowitz and P. Nikander, &ldquo;Host identity protocol (HIP) architecture,&rdquo; RFC 4423, 2006.","DOI":"10.17487\/rfc4423"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Pan, S. Paul, R. Jain, and M. Bowman, &ldquo;MILSA: A mobility and multihoming supporting identifier locator split architecture for naming in the next generation Internet,&rdquo; Proc. Global Telecommunications Conference, pp.1-6, 2008.","DOI":"10.1109\/GLOCOM.2008.ECP.436"},{"key":"3","unstructured":"[3] D. Farinacci, D.and Fuller, D. Oran, and M.D., &ldquo;Locator\/ID separation protocol (LISP),&rdquo; IETF draft-farinacci-lisp-12.txt, 2009."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard, &ldquo;Networking named content,&rdquo; Proc. 5th International Conference on Emerging Networking Experiments and Technologies, pp.1-12, 2009.","DOI":"10.1145\/1658939.1658941"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, and I. Stoica, &ldquo;ROFL: Routing on flat labels,&rdquo; ACM SIGCOMM Computer Communication Review, pp.363-374, 2006.","DOI":"10.1145\/1151659.1159955"},{"key":"6","unstructured":"[6] &ldquo;Mobilityfirst future Internet architecture project technical approach.&rdquo; http:\/\/mobilityfirst.winlab.rutgers.edu\/, accessed Sept. 2012."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] T. Vu, A. Baid, Y. Zhang, T. Nguyen, J. Fukuyama, R. Martin, and D. Raychaudhuri, &ldquo;Dmap: A shared hosting scheme for dynamic identifier to locator mappings in the global Internet,&rdquo; Proc. 32nd International Conference on Distributed Computing Systems (ICDCS), pp.698-707, 2012.","DOI":"10.1109\/ICDCS.2012.50"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J. Hou, Y. Liu, and Z. Gong, &ldquo;SILMS: A scalable and secure identifier-to-locator mapping service system design for future Internet,&rdquo; Proc. 2nd International Workshop on Computer Science and Engineering (WCSE'09), pp.54-58, 2009.","DOI":"10.1109\/WCSE.2009.765"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] C. Vogt, &ldquo;Six\/one router: a scalable and backwards compatible solution for provider-independent addressing,&rdquo; Proc. 3rd International Workshop on Mobility in the Evolving Internet Architecture, pp.13-18, Citeseer, 2008.","DOI":"10.1145\/1403007.1403011"},{"key":"10","unstructured":"[10] D. Jen, M. Meisel, D. Massey, L. Wang, B. Zhang, and L. Zhang, &ldquo;APT: A practical tunneling architecture for routing scalability,&rdquo; Tech. Rep., UCLA Computer Science Department, 2008."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Y. Rekhter and T. Li, &ldquo;A border gateway protocol 4 (BGP-4),&rdquo; RFC 4271, 1995.","DOI":"10.17487\/rfc1771"},{"key":"12","unstructured":"[12] Y. Song and L. Gao, &ldquo;Identifying and addressing reachability and policy,&rdquo; Tech. Rep., University of Massachusetts, 2012."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] X. Zhang, H. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. Andersen, &ldquo;SCION: Scalability, control, and isolation on next-generation networks,&rdquo; IEEE Symposium on Security and Privacy (SP), pp.212-227, 2011.","DOI":"10.21236\/ADA579930"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] P. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, &ldquo;Pathlet routing,&rdquo; Proc. ACM SIGCOMM 2009, pp.111-122, 2009.","DOI":"10.1145\/1592568.1592583"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, &ldquo;How secure are secure interdomain routing protocols?,&rdquo; Comput. Commun. Rev., vol.40, no.4, p.87, 2010.","DOI":"10.1145\/1851275.1851195"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] S. Kent, C. Lynn, and K. Seo, &ldquo;Secure border gateway protocol (S-BGP),&rdquo; IEEE J. Sel. Areas Commun., vol.18, no.4, pp.582-592, 2000.","DOI":"10.1109\/49.839934"},{"key":"17","unstructured":"[17] R. White, &ldquo;Securing BGP through secure origin BGP (soBGP),&rdquo; Business Communications Review, vol.33, no.5, pp.47-53, 2003."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] T. Dierks, &ldquo;The transport layer security (TLS) protocol version 1.2,&rdquo; RFC 5246, 2008.","DOI":"10.17487\/rfc5246"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] L. Gao and J. Rexford, &ldquo;Stable Internet routing without global coordination,&rdquo; IEEE\/ACM Trans. Netw. (TON), vol.9, no.6, pp.681-692, 2001.","DOI":"10.1109\/90.974523"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] E. Wong, P. Balasubramanian, L. Alvisi, M. Gouda, and V. Shmatikov, &ldquo;Truth in advertising: Lightweight verification of route integrity,&rdquo; Proc. 26th Annual ACM Symposium on Principles of Distributed Computing, pp.147-156, 2007.","DOI":"10.1145\/1281100.1281123"},{"key":"21","unstructured":"[21] K. Josh, &ldquo;BGP simulator,&rdquo; http:\/\/www.cs.unm.edu\/~karlinjf\/pgbgp\/, accessed Jan. 2012."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, &ldquo;Accountable Internet protocol (AIP),&rdquo; Comput. Commun. Rev., vol.38, no.4, p.339, 2008.","DOI":"10.1145\/1402946.1402997"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. Andersen, J. Byers, S. Seshan, and P. Steenkiste, &ldquo;XIA: Efficient support for evolvable internetworking,&rdquo; Proc. USENIX NSDI, 2012.","DOI":"10.1145\/2070562.2070564"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] M. Freedman, M. Arye, P. Gopalan, S. Ko, E. Nordstrom, J. Rexford, and D. Shue, &ldquo;Service-centric networking with SCAFFOLD,&rdquo; Tech. Rep., Princeton Computer Science Department, 2010.","DOI":"10.21236\/ADA571380"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] K. Butler, T. Farley, P. McDaniel, and J. Rexford, &ldquo;A survey of BGP security issues and solutions,&rdquo; Proc. IEEE, vol.98, no.1, pp.100-122, 2010.","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"26","unstructured":"[26] T. Wan, E. Kranakis, and P. van Oorschot, &ldquo;Pretty secure BGP (psBGP),&rdquo; Proc. NDSS, 2005."},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] Y. Hu, A. Perrig, and M. Sirbu, &ldquo;SPV: Secure path vector routing for securing BGP,&rdquo; ACM SIGCOMM Computer Communication Review, vol.34, no.4, pp.179-192, 2004.","DOI":"10.1145\/1030194.1015488"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] J. Karlin, S. Forrest, and J. Rexford, &ldquo;Pretty good BGP: Improving BGP by cautiously adopting routes,&rdquo; Proc. 14th IEEE International Conference on Network Protocols (ICNP'06), pp.290-299, 2006.","DOI":"10.1109\/ICNP.2006.320179"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] L. Subramanian, M. Caesar, C. Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica, &ldquo;HLP: A next generation inter-domain routing protocol,&rdquo; vol.35, no.4, pp.13-24, 2005.","DOI":"10.1145\/1090191.1080095"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E96.B\/7\/E96.B_1742\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:56:33Z","timestamp":1704898593000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E96.B\/7\/E96.B_1742\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":29,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2013]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.e96.b.1742","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}