<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ren-sidrops-soa-usage" target="https://datatracker.ietf.org/doc/html/draft-ren-sidrops-soa-usage-02">
   <front>
      <title>Source Address Validation Using Source Origin Authorizations (SOAs)</title>
      <author initials="R." surname="Gang" fullname="Ren Gang">
         <organization>Tsinghua University</organization>
      </author>
      <author initials="M." surname="Jia" fullname="Minglin Jia">
         <organization>Tsinghua University</organization>
      </author>
      <author initials="X." surname="Yin" fullname="Xia Yin">
         <organization>Tsinghua University</organization>
      </author>
      <author initials="S." surname="Liu" fullname="Shuqi Liu">
         <organization>Tsinghua University</organization>
      </author>
      <date month="December" day="25" year="2025" />
      <abstract>
	 <t>   Given that an AS collaboration scheme for inter-domain source address
   validation requires an information-sharing platform, this document
   proposes a new approach by leveraging Resource Public Key
   Infrastructure (RPKI) architecture to validate the authenticity of
   source address of packets.  Source Origin Authorization (SOA) is a
   newly defined cryptographically signed object; it provides a means of
   recording information about the last Autonomous System (AS) traversed
   by packets before reaching a specific AS.  When validated, the
   eContent of an SOA object confirms that the holder of the listed AS
   Number (ASN) has authorized the specified pre-ASes.  This enables
   other ASes to collaboratively filter spoofed traffic, enhancing
   global Internet security by mitigating source address spoofing and
   DDoS attacks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ren-sidrops-soa-usage-02" />
   
</reference>
