[1]
Y. Liu, Z. Liu, B. Wang and Q. Yang. SIR: A Secure Identifier-based Inter-domain Routing for Identifier/Locator Split Network IEICE Transaction on Communication, Vol. E96-B, No. 07, Jul. (2013).
DOI: 10.1587/transcom.e96.b.1742
Google Scholar
[2]
R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture, IETF Internet Standard, RFC 4423, May (2006).
DOI: 10.17487/rfc4423
Google Scholar
[3]
J. Pan, S. Paul, R. Jain, and M. Bowman, MILSA: A New EvolutionaryArchitecture for Scalability, Mobility, and Multihoming in the FutureInternet, Selected Areas in Communications, IEEE Journal on, Vol. 28, No. 8, p.1344–1362, Oct. (2010).
DOI: 10.1109/jsac.2010.101012
Google Scholar
[4]
D. Farinacci, D. Fuller, D. Oran, and D. Meyer, Locator/ID separationprotocol (LISP), IETF Internet Draft, draft-farinacci-lisp-12. txt, Sep. (2009).
DOI: 10.17487/rfc6832
Google Scholar
[5]
T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfarl, and D. Kuptsov. Architecting for Innovation. ACM SIGCOMM Computer Communication Review, pp.24-36 Vol. 41, No. 3, Jul. (2011).
DOI: 10.1145/2002250.2002256
Google Scholar
[6]
X. Zhang, H. Hsiao, G. Hasker, H. Chan, A. Perrig and D. Andersen. SCION: Scalability, Control, and Isolation OnNext-Generation Networks. IEEE Symposium on Security and Privacy 2011, pp.212-227. (2011).
DOI: 10.1109/sp.2011.45
Google Scholar
[7]
Y. Rekhter. A Border Gateway Protocol 4 (BGP-4), 2006. RFC 4271.
Google Scholar
[8]
P. Godfrey, S. Shenker, and I. Stoica. Pathlet Routing. In Proc. HotNets, (2008).
Google Scholar
[9]
S. Kent, C. Lynn, and K. Seo, Secure border gateway protocol (SBGP), IEEE Journal on Selected Areas in Communications, Vol. 18, No. 4, p.582–592, (2000).
DOI: 10.1109/49.839934
Google Scholar
[10]
R. White, Securing BGP through secure origin BGP (soBGP), Business Communications Review, Vol. 33, No. 5, p.47–53, (2003).
Google Scholar
[11]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. InProc. CoNEXT, (2009).
DOI: 10.1145/1658939.1658941
Google Scholar
[12]
M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica, andS. Shenker, ROFL: Routing on Flat Labels, in SIGCOMM, 2006, p.363–374.
DOI: 10.1145/1151659.1159955
Google Scholar
[13]
MobilityFirst Future Internet Architecture Project, http: /mobilityfirst. winlab. rutgers. edu.
Google Scholar
[14]
T. Vu, A. Baid, Y. Zhang, T. D. Nguyeny, J. Fukuyamaz, R. P. Martin , D. Raychaudhuri. DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet. ICDCS (2012).
DOI: 10.1109/icdcs.2012.50
Google Scholar
[15]
C. Vogt, Six/one router: a scalable and backwards compatible solutionfor provider-independent addressing, in Proceedings of MobiArch '08, 2008, p.13–18.
DOI: 10.1145/1403007.1403011
Google Scholar
[16]
K. Butler, P. McDaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions. In Proc. the IEEE Vol. 98, No. 1, Jan. (2010).
DOI: 10.1109/jproc.2009.2034031
Google Scholar
[17]
Y. Song, L. Gao. Identifying and Addressing Reachability and Policy. Technical Report, University of Massachusetts, (2012).
Google Scholar
[18]
T. Dierks. The Transport Layer Security (TLS) ProtocolVersion 1. 2, RFC 5246. August (2008).
Google Scholar
[19]
L. Gao, J. Rexford. Stable Internet Routing Without Global Coordination. IEEE/ACM Transactions on networking, Vol. 9, No. 6, pp.681-692, Dec. (2001).
DOI: 10.1109/90.974523
Google Scholar
[20]
S. Goldberg,M. Schapira,P. Hummon, J. Rexford. How Secure are Secure Interdomain Routing Protocols?. Sigcomm (2010).
DOI: 10.1145/1851182.1851195
Google Scholar
[21]
BGP Simulator, 2008. [Online]. Available: http: /www. cs. unm. edu/~karlinjf/pgbgp.
Google Scholar