Networking

Resolving Vulnerability of First Hop Redundancy Protocol Using Md5 Authentication

Free registration required

Executive Summary

Security issues are major constraints in computer networks. According to CSA 90% of attacks are from inside the network. Earlier the issue was mainly with WAN networks but now the scenarios have changed. With development in technology, attacks are now more concentrated within a LAN. The authors' paper will mine the vulnerabilities in LAN technology and specifically point the problem regarding FIRST HOP REDUNDANCY. Also, here they present an effective reform to the aforesaid problem through MD5 algorithm based authentication, comparing it with previously suggested solutions. The only aim is to have a more secure communication without affecting the efficiency of the network.

  • Format: PDF
  • Size: 326 KB