Abstract
Evaluating the security of a network architecture, including its routing protocols and supporting infrastructure, is an ambitious undertaking. Indeed, the security guarantees afforded by the architecture, as well as the security of the architecture itself, depend on a number of factors. For example, should we assume correct implementation and configuration of the protocol at all deploying nodes? Do we consider an adversary that can eavesdrop on a large portion of network links? Can malware on end hosts send arbitrary traffic?
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Perrig, A., Szalachowski, P., Reischuk, R.M., Chuat, L. (2017). Security Analysis. In: SCION: A Secure Internet Architecture. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-67080-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-67080-5_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67079-9
Online ISBN: 978-3-319-67080-5
eBook Packages: Computer ScienceComputer Science (R0)