Trust degree based inter-domain routing mechanism

被引:1
|
作者
Tan J. [1 ]
Luo J.-Z. [1 ]
Li W. [1 ]
Yu F. [1 ]
机构
[1] School of Computer Science and Engineering, Southeast University
来源
关键词
Chord ring; Inter-domain routing; Trust degree; Trustworthy and controllable network;
D O I
10.3724/SP.J.1016.2010.01763
中图分类号
学科分类号
摘要
Current inter-domain routing does not verify the reality of the received routes, it may cause the large-scale spread of false routes. To filter false routes, trust is introduced to inter-domain routing and an Trust Degree based Inter-domain Routing Mechanism(TDIRM) is proposed in this paper. The main idea of TDIRM is computing the trust degree of candidate paths and selecting the best path according to the trust degree. In TDIRM, Some ASes are selected to build a Chord ring for publishing and acquiring trust information of routing. ASes that can detect the false paths publish the trust information in the Chord ring, and other nodes can obtain the trust information from the Chord ring, compute the trust degree of the routes and select the trustworthy route information to distribute. The experimental results show that TDIRM can filter the false routes timely and improve the trustworthiness of routing.
引用
收藏
页码:1763 / 1774
页数:11
相关论文
共 23 条
  • [1] Li Q., Wu J.-P., Xu M.-W., Xu K., Zhang X.-W., GesBGP: A good-enough-security BGP, Chinese Journal of Computers, 32, 3, pp. 506-515, (2009)
  • [2] Kent S., Lynn C., Seo K., Secure border gateway protocol, IEEE Journal on Selected Areas in Communications, 18, 4, pp. 582-592, (2000)
  • [3] White R., Securing BGP through secure origin BGP, The Internet Protocol Journal, 6, 3, pp. 15-22, (2003)
  • [4] Siganos G., Faloutsos M., Analyzing BGP policies: Methodology and tool, Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2004), pp. 1640-1651, (2004)
  • [5] Goodell G., Aiello W., Griffin T., Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, Proceedings of the ISOC NDSS 2003, pp. 75-85, (2003)
  • [6] Pei D., Lad M., Massey D., Zhang L., Route diagnosis in path vector protocols, (2004)
  • [7] Lad M., Massey D., Pei D., Wu Y., Zhang B., Zhang L.X., PHAS: A prefix hijack alert system, Proceedings of the 15th USENIX Security Symposium (Security 2006), pp. 153-166, (2006)
  • [8] The RIPE NCC MyASN service, (2008)
  • [9] Hu N., Zou P., Zhu P.-D., Reputation-based collaborative management method for inter-domain routing security, Journal of Software, 21, 3, pp. 505-515, (2010)
  • [10] Eschenauer L., Gligor V.D., Baras J., On trust establishment in mobile ad-hoc networks, Proceedings of the 10th International Security Protocols Workshop, pp. 47-66, (2002)