Identity-based secure inter-domain routing protocol

被引:2
|
作者
Wang, Na [1 ,2 ]
Zhi, Ying-Jian [2 ]
Zhang, Jian-Hui [2 ]
Cheng, Dong-Nian [2 ]
Wang, Bin-Qiang [2 ]
机构
[1] College of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China
[2] College of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China
来源
Ruan Jian Xue Bao/Journal of Software | 2009年 / 20卷 / 12期
关键词
Routing protocols - Authentication - Routers;
D O I
10.3724/SP.J.1001.2009.03396
中图分类号
学科分类号
摘要
The paper proposes a secure inter-domain routing protocol which adopts identity-based cryptographic system-id2r (identity-based inter-domain routing). id2r consists of a key management mechanism, an origin AS verification mechanism LAP (the longest assignment path), and an AS_PATH authenticity verification mechanism IDAPV (Identity-based Aggregate Path Verification). The key management mechanism adopts a distributed and hierarchical key issuing protocol DHKI (distributed and hierarchical key issuing) to solve the inherent key escrow problem in the identity-based cryptographic system. The basic idea of LAP is that all ASes must provide the assignment path and attestations of their announced prefixes, and for a prefix, the AS which provides the longest valid assignment path is its legitimate origin AS. With identity-based aggregate signature scheme, IDAPV generates a route aggregate attestation to guarantee the authenticity of AS_PATH. Performance evaluation results indicate that based on RouteViews data on December 7, 2007, an id2r router only consumes 1.71Mbytes additional memory, which is 38% of S-BGP router; id2r has shorter UPDATE message than S-BGP; convergence time of id2r with hardware implementation of cryptographic algorithm approximately equals BGP. © by Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3223 / 3239
相关论文
共 50 条
  • [1] A Secure Inter-domain Routing Protocol
    Wang, Na
    Wang, Binqiang
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 780 - 785
  • [2] Inter-domain Identity-Based Proxy Re-encryption
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 332 - 347
  • [3] Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey
    Mastilak, Lukas
    Helebrandt, Pavol
    Galinski, Marek
    Kotuliak, Ivan
    SENSORS, 2022, 22 (04)
  • [4] A reputation-based method to secure inter-domain routing
    Wang Na
    Wang Bin-qiang
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1424 - 1429
  • [5] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [6] An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain
    Liu, Yaping
    Zhang, Shuo
    Zhu, Haojin
    Wan, Peng-Jun
    Gao, Lixin
    Zhang, Yaoxue
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 63 - 82
  • [7] AS Alliance based security enhancement for inter-domain routing protocol
    Zhu, Peidong
    Cao, Huayang
    Yang, Laurence T.
    Chen, Kan
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 241 - 255
  • [8] TTM Based Security Enhancement for Inter-domain Routing Protocol
    Zhu, Peidong
    Hu, Xiangjiang
    Cao, Huayang
    Wang, Xiaoqiang
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 262 - 265
  • [9] A routing policy description language for the inter-domain routing protocol
    Murata, A
    Tsukamoto, M
    Nishio, S
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS, 1997, 80 (06): : 58 - 65
  • [10] An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks
    Hwang, Ren Junn
    Hsiao, Yu-Kai
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (09) : 2718 - 2727