GNS-Based Simulation and Analysis of OSPFv2 Neighbor Authentication

Article Preview

Abstract:

Routing information release is a kind of promise from the router for network reachability. Illegal routing information may have disastrous effects on the normal work of the network. Open Shortest Path First (OSPF) protocol provides authentication methods to protect the authenticity and integrity of the routing traffic. This paper describes two authentication types of OSPFv2, analyzes the realization mechanism and packet header format of each authentication respectively. Based on GNS3, a typical network topology was designed, and with the aid of it functional verification and security analysis are carried out. The simulation can provide a reference for building an OSPF network. Experimental results show that the configuration of OSPFv2 routing authentication can effectively prevent the router from receiving unauthorized or malicious routing updates, thereby improving network safety.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4603-4607

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Bauer, et al., A case study in understanding OSPF and BGP interactions using efficient experiment design, Proc. 20th Workshop on Principles of Advanced and Distributed Simulation, PADS, May 24, 2006 - May 26, 2006, Institute of Electrical and Electronics Engineers Computer Society, 2006, pp.158-165.

DOI: 10.1109/pads.2006.6

Google Scholar

[2] Y.N. Krishnan and G. Shobha, Performance analysis of OSPF and EIGRP routing protocols for greener internetworking, Proc. 2013 International Conference on Green High Performance Computing, ICGHPC 2013, March 14, 2013 - March 15, 2013, IEEE Computer Society, (2013).

DOI: 10.1109/icghpc.2013.6533929

Google Scholar

[3] G.P.S. Kalyan and D.V.V. Prasad, Optimal selection of Dynamic Routing Protocol with real time case studies, Proc. 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012, April 25, 2012 - April 27, 2012, IEEE Computer Society, 2012, pp.219-223.

DOI: 10.1109/racss.2012.6212727

Google Scholar

[4] P. Li, et al., Research on security of OSPF routing protocol with digital signature, Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, vol. 25, no. 2, 2005, pp.86-90.

Google Scholar

[5] D. -F. Li, et al., Secure protection mechanism for OSPF protocol with sinitizable signature scheme, Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, vol. 34, no. 3, 2011, pp.79-83.

Google Scholar