[1]REKHER Y, LI T, HARES S. RFC 4271, A border gateway protocol 4 (BGP-4) [S]. Reston: IETF, 2006. [2]MALKIN G. RFC 2453, RIP Version 2 [S]. Reston: IETF, 1998.[3]MOY J. RFC 2328, OSPF version 2 [S]. Reston: IETF, 1998.[4]ORAN D. RFC 1142, OSI IS-IS intra-domain routing protocol [S]. Reston: IETF, 1990.[5]JONES E, LE MOIGNE O. OSPF security vulnerabilities analysis [EB/OL].(2006-06-16) [2012-12-09]. http://tools.ietf.org/html/draft-ietf-rpsec-ospf-vuln-02.[6]HARTMAN S, ZHANG D. RFC 6863, Analysis of OSPF security according to the keying and authentication for routing protocol (KARP) Design Guide[S]. Reston: IETF, 2013.[7]BHATIA M, MANRAL V, FANTO M, et al. RFC 5709, OSPF HMAC-SHA cryptographic authentication [S]. Reston: IETF, 2009.[8]MURPHY S, BADGER M, WELLINGTON B. RFC 2154, OSPF with digital signatures [S]. Reston: IETF, 1997.[9]李道丰,杨义先,谷利泽,孙斌. 采用可净化签名的OSPF协议安全保护机制[J]. 北京邮电大学学报, 2011, 34(3): 79-83.[10]DECCIO C T, CLEMENT M, SEAMONS K, Securing OSPF using digital signatures and neighbor checking [EB/OL]. [2012-11-26]. http://dna.cs.byu.edu/papers/pdf/ospf.pdf.[11]BRUHADESHWAR B, KOTHAPALLI K, POORNIMA M, et al. Routing protocol security using symmetric key based techniques [C]//ARES 09: Proceedings of the Fourth International Conference on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2009:193-200.[12]YU M. Security enhancements to routing protocols for backbone networks [C]// SMC 06: Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE, 2006, 3: 1891-1896.[13]THOMAS T. OSPF network design solution [M]. 2nd ed. Indianapolis: Cisco Press, 2003.[14]秦科,张小松,郝玉洁,等. 网络安全协议 [M]. 成都: 电子科技大学出版社, 2008.[15]施荣才,翁丽萍,王国才.基于单向哈希链的Ad Hoc网络密钥协商协议[J].湖南大学学报:自然科学版,2010,38(3):77-81.[16]HUANG D, MEDHI D. A key-chain based keying scheme for many-to-many secure group communication [J]. ACM Transactions on Information and System Security, 2004, 7(4):523-552.[17]北京交通大学,计算机与信息学院.在无向完全图中寻找边不重复的汉密尔顿回路[EB/OL]. (2005-06-07) [2012-12-16]. http://www.doc88.com/p-402265120707.html.[18]许春香, 周俊辉.信息安全数学基础 [M].成都:电子科技大学出版社,2008.[19]HUANG D, MEDHI D. A secure group key management scheme for hierarchical mobile Ad Hoc networks [J]. Ad Hoc Networks, 2008, 6(4):560-577.[20]AHO A V, LEE D, HILL M. Hierarchical networks and the LSA N-squared problem in OSPF routing[C]// GLOBECOM 00: Proceedings of the 2000 IEEE Global Telecommunications Conference. Piscataway: IEEE, 2000, 1:397-404. |