Abstract

Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that can eventually lead to large monetary losses. Approach: MD5 Authentication: Due to the major role that routing protocols play in computer network infrastructures, special cares has been given to routing protocols with built-in security constraints using authentication techniques, MD5 will be presented for this work. Results: The study evaluates the impact of the MD5 authentication on routing traffic for the case of EIGRP, RIPv2 and OSPF routing protocols in case of secured and non-secured routing traffic and measures the delay time, jitter and overhead. Conclusions: This study shows that the average delay time and jitter in the secured MD5 case can become significantly larger when compared to the unsecured case even in steady state conditions. Also, the EIGRP protocol shows the minimum overhead even when the system is extremely overloaded.

Highlights

  • Last packet in the burst passes through the router

  • Describe the EIGRP, Routing Information Protocol version 2 (RIPv2) and OSPF routing in[2], the authors presented an approximate model for protocols, presents the authentication technique used to measuring the time from which a burst transmission secure the EIGRP, RIPv2 and OSPF, namely the MD5 request is received by a source to the time at which the authentication, illustrates the real model of Cisco

  • The results show the average delay time of RIPv2 is continuously larger than the other two routing protocols

Read more

Summary

Introduction

Last packet in the burst passes through the router. The results showed that burst delay offers acceptable. In [1], for authentication of EIGRP, RIPv2 and OSPF routing example, an experimental setup was developed to traffic in two contexts: Secured and un-secured. Each router uses a combination of this number and the traffic data as inputs to the MD5 algorithm to produce a message digest called hash. EIGRP, RIPv2 and OSPF are supported keyed MD5 cryptographic checksums to provide authentication of traffic data including routing updates.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call