This is the most common direct attack against a routing protocol. This attack mainly targets the routing information exchanged between the nodes. In order to disrupt traffic in the network, an attacker may spoof, alter or reply routing information. These disruptions include the creation of routing loops, extending and shortening source routes, attracting or repelling network traffic from select nodes, partitioning the network, generating fake error messages and increasing end-to-end latency. Authentication is the standard solution for these attack i.e routers will only accept routing information from valid routers