{"id":"https://openalex.org/W2286132365","doi":"https://doi.org/10.17487/rfc6039","title":"Issues with Existing Cryptographic Protection Methods for Routing Protocols","display_name":"Issues with Existing Cryptographic Protection Methods for Routing Protocols","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2286132365","doi":"https://doi.org/10.17487/rfc6039","mag":"2286132365"},"language":"en","primary_location":{"id":"doi:10.17487/rfc6039","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc6039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066114478","display_name":"Vishwas Manral","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"V. Manral","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038255664","display_name":"Manav Bhatia","orcid":null},"institutions":[{"id":"https://openalex.org/I151281966","display_name":"Cisco Systems (China)","ror":"https://ror.org/02qy75381","country_code":"CN","type":"company","lineage":["https://openalex.org/I135428043","https://openalex.org/I151281966"]},{"id":"https://openalex.org/I2738502077","display_name":"Nokia (Finland)","ror":"https://ror.org/04pkc8m17","country_code":"FI","type":"company","lineage":["https://openalex.org/I2738502077"]}],"countries":["CN","FI"],"is_corresponding":false,"raw_author_name":"M. Bhatia","raw_affiliation_strings":["Nokia Inc. R. White Cisco Systems"],"affiliations":[{"raw_affiliation_string":"Nokia Inc. R. White Cisco Systems","institution_ids":["https://openalex.org/I151281966","https://openalex.org/I2738502077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075947290","display_name":"Joel Jaeggli","orcid":null},"institutions":[{"id":"https://openalex.org/I151281966","display_name":"Cisco Systems (China)","ror":"https://ror.org/02qy75381","country_code":"CN","type":"company","lineage":["https://openalex.org/I135428043","https://openalex.org/I151281966"]},{"id":"https://openalex.org/I2738502077","display_name":"Nokia (Finland)","ror":"https://ror.org/04pkc8m17","country_code":"FI","type":"company","lineage":["https://openalex.org/I2738502077"]}],"countries":["CN","FI"],"is_corresponding":false,"raw_author_name":"J. Jaeggli","raw_affiliation_strings":["Nokia Inc. R. White Cisco Systems"],"affiliations":[{"raw_affiliation_string":"Nokia Inc. R. White Cisco Systems","institution_ids":["https://openalex.org/I151281966","https://openalex.org/I2738502077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110200207","display_name":"R. White","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. White","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066114478"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7227811813354492},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6507876515388489},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6291033029556274},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.5815539956092834},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5727540254592896},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5374050736427307},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5256739258766174},{"id":"https://openalex.org/keywords/interior-gateway-protocol","display_name":"Interior gateway protocol","score":0.41174086928367615},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41076046228408813},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.3895694315433502},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34151172637939453},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.3282082676887512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7227811813354492},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6507876515388489},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6291033029556274},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.5815539956092834},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5727540254592896},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5374050736427307},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5256739258766174},{"id":"https://openalex.org/C52837422","wikidata":"https://www.wikidata.org/wiki/Q431028","display_name":"Interior gateway protocol","level":5,"score":0.41174086928367615},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41076046228408813},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.3895694315433502},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34151172637939453},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.3282082676887512}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.17487/rfc6039","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc6039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.186.1605","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.1605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://info.internet.isi.edu/in-notes/pdfrfc/rfc6039.txt.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.697.4608","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.4608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.hakusan.tsg.ne.jp/%7Etjkawa/www.ietf.org/rfc/pdf/rfc6039.txt.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W9162323","https://openalex.org/W49782160","https://openalex.org/W127469507","https://openalex.org/W1550771246","https://openalex.org/W1579664096","https://openalex.org/W1617049727","https://openalex.org/W1627007230","https://openalex.org/W1656678770","https://openalex.org/W1656731780","https://openalex.org/W1675699606","https://openalex.org/W1728701145","https://openalex.org/W1764639440","https://openalex.org/W1831175085","https://openalex.org/W1927150730","https://openalex.org/W1959110288","https://openalex.org/W2121670402","https://openalex.org/W2133252868","https://openalex.org/W2147877969","https://openalex.org/W2235546383","https://openalex.org/W2243203026","https://openalex.org/W2252838555","https://openalex.org/W2256571066","https://openalex.org/W2287264259","https://openalex.org/W2288917395","https://openalex.org/W2291292531","https://openalex.org/W2396263478","https://openalex.org/W2507256605","https://openalex.org/W2507633571","https://openalex.org/W2509853061","https://openalex.org/W3216850242","https://openalex.org/W4206113377","https://openalex.org/W4230038347","https://openalex.org/W4231078754","https://openalex.org/W4290473017","https://openalex.org/W4301715020","https://openalex.org/W4302094287"],"related_works":["https://openalex.org/W2537880892","https://openalex.org/W196202365","https://openalex.org/W811976357","https://openalex.org/W2608783000","https://openalex.org/W4214627081","https://openalex.org/W2218255545","https://openalex.org/W3111999705","https://openalex.org/W2181555981","https://openalex.org/W2373440974","https://openalex.org/W2565016321"],"abstract_inverted_index":{"Routing":[0],"protocols":[1],"have":[2],"been":[3,22,138],"extended":[4],"over":[5],"time":[6],"to":[7,11,38,55],"use":[8],"cryptographic":[9,35,81],"mechanisms":[10,36],"ensure":[12],"that":[13],"data":[14],"received":[15,133],"from":[16,29],"a":[17,47,51,114,157],"neighboring":[18,32],"router":[19],"has":[20,132,137],"not":[21,99],"modified":[23],"in":[24,42,59],"transit":[25],"and":[26,40,83,136],"actually":[27],"originated":[28],"an":[30,100],"authorized":[31],"router.":[33],"The":[34],"defined":[37],"date":[39],"described":[41],"this":[43],"document":[44,65,97,112],"rely":[45],"on":[46],"digest":[48],"produced":[49],"with":[50,76],"hash":[52],"algorithm":[53],"applied":[54],"the":[56,60,69,72,87,117,125,128,143,154],"payload":[57],"encapsulated":[58],"routing":[61],"protocol":[62],"packet.":[63],"This":[64,94,96,111],"outlines":[66],"some":[67],"of":[68,71,79,89,93,116,127,162],"limitations":[70],"current":[73],"mechanism,":[74],"problems":[75],"manual":[77],"keying":[78],"these":[80,90],"algorithms,":[82],"possible":[84],"vectors":[85],"for":[86,108,140,159],"exploitation":[88],"limitations.":[91],"Status":[92],"Memo":[95],"is":[98,106,113],"Internet":[101,118,144,163],"Standards":[102],"Track":[103],"specification;":[104],"it":[105],"published":[107],"informational":[109],"purposes.":[110],"product":[115],"Engineering":[119,145],"Task":[120],"Force":[121],"(IETF).":[122],"It":[123,131],"represents":[124],"consensus":[126],"IETF":[129],"community.":[130],"public":[134],"review":[135],"approved":[139,152],"publication":[141],"by":[142,153],"Steering":[146],"Group":[147],"(IESG).":[148],"Not":[149],"all":[150],"documents":[151],"IESG":[155],"are":[156],"candidate":[158],"any":[160],"level":[161]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
