F. Baker and R. Atkinson, RIP-II MD5 Authentication, RFC, vol.2082, 1997.
DOI : 10.17487/rfc2082

R. E. Bellman, Dynamic Programming, 1957.

S. M. Bellovin, Security problems in the TCP/IP protocol suite, ACM SIGCOMM Computer Communication Review, vol.19, issue.2, pp.32-48, 2001.
DOI : 10.1145/378444.378449

A. Barbir, S. Murphy, and Y. Yang, Generic Threats to Routing Protocols". Internet Draft <draft-ietf-rpsec-routing-threats-07.txt>, 2004.
DOI : 10.17487/rfc4593

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.2266

Y. Challal, H. Bettahar, and A. Bouabdallah, A taxonomy of multicast data origin authentication: Issues and solutions, IEEE Communications Surveys & Tutorials, vol.6, issue.3, pp.34-57, 2004.
DOI : 10.1109/COMST.2004.5342292

URL : https://hal.archives-ouvertes.fr/hal-00339981

A. Chakrabarti and G. Manimaran, Internet infrastructure security: a taxonomy, IEEE Network, vol.16, issue.6, pp.13-21, 2002.
DOI : 10.1109/MNET.2002.1081761

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.7463

A. Chakrabarti and G. Manimaran, An efficient algorithm for malicious update detection & recovery in distance vector protocols, IEEE International Conference on Communications, 2003. ICC '03., pp.1952-1956, 2003.
DOI : 10.1109/ICC.2003.1203939

J. J. Garcia-luna-aceves and S. Murphy, A Loop-Free Algorithm Based on Predecessor Information, Proc. of IEEE INFOCOM, 1995.

C. Hedric, Routing Information Protocol, 1988.
DOI : 10.17487/rfc1058

A. Heffernan, Protection of BGP Sessions via the TCP MD5 Signature Option, RFC 2385, 1998.
DOI : 10.17487/rfc2385

R. Housley, T. Polk, W. Ford, and D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list CRL profile, 2002.
DOI : 10.17487/rfc3280

Y. C. Hu, A. Perrig, and D. B. Johnson-nita-rotaru, Efficient Security Mechanisms for Routing Protocols, Proc. Of NDSS, 2003.

S. Kent, C. Lynn, and K. Seo, Secure Border Gateway Protocol (S-BGP), Secure Border Gateway Protocol, pp.582-592, 2000.
DOI : 10.1109/49.839934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.762

J. Moy, OSPF version 2, 1998.
DOI : 10.17487/rfc1247

V. Mittal and G. Vigna, Sensor-based intrusion detection for intra-domain distance-vector routing, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.127-137, 2002.
DOI : 10.1145/586110.586129

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.2102

C. Perkins, E. Belding-royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC, vol.3561, 2003.
DOI : 10.17487/rfc3561

C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers, Proc. of the conference on Communications, Architectures, Protocols, and Applications, pp.234-344, 1994.

R. Perlman, Network Layer Protocols with Byzantine Robustness, 1988.

P. Papadimitratos and Z. J. Haas, Securing the Internet routing infrastructure, IEEE Communication Magazine, pp.60-68, 2002.
DOI : 10.1109/MCOM.2002.1039858

D. Pei, D. Massey, and L. Zhang, Detection of invalid routing announcements in RIP protocol, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2003.
DOI : 10.1109/GLOCOM.2003.1258478

D. Pei, D. Massey, and L. Zhang, A framework for resilient internet routing protocols, IEEE Network, vol.18, issue.2, 2004.
DOI : 10.1109/MNET.2004.1276605

R. Rivest, The MD5 Message-Digest Algorithm, RFC, vol.1321, 2002.
DOI : 10.17487/rfc1321

B. R. Smith, J. J. Murthy, and . Garcia-luna-aceves, Securing distance-vector routing protocols, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security, 1997.
DOI : 10.1109/NDSS.1997.579225

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.8713

R. White, Deployment Considerations for Secure Origin BGP (soBGP)". Internet Draft <draft-white-sobgp-bgp-deployment-01.txt>, 2003.

T. Wan, E. Kranakis, and P. C. Van-oorschot, S-RIP: A Secure Distance Vector Routing Protocol, Proc. of Applied Cryptography and Network Security, 2004.
DOI : 10.1007/978-3-540-24852-1_8