A New Path Verification Protocol for Securing BGP

被引:0
|
作者
Wang, Na
Zhi, Yingjian
Wang, Binqiang
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes an ID-based Aggregate Path Verification protocol (IDAPV) to provide authenticity for route announcements in the Border Gateway (BGP) with a more efficient and easily deployed ID-based aggregate signature scheme instead of certificate-based scheme, which leads to performance and deployment matters of current proposals, and a secure key issuing protocol to hold the privacy of the system master key and router's private key in IDAPV, for in the ID-based cryptographic scheme, private key generator has the knowledge about these secrets, which is greatly risky in the real world. Compared with S-BGP, IDAPV simplifies key management process, consumes lesser memory and has shorter update message. Our simulation result indicates that convergence time of IDAPV with hardware implementation approximates BGP.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [1] IBAPV: An Identity-Based Aggregate Path Verification Protocol for Securing BGP
    Wang, Na
    Zhi, Yingjian
    Wang, Binqiang
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 987 - 993
  • [2] SPV: Secure Path Vector routing for securing BGP
    Hu, YC
    Perrig, A
    Sirbu, M
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 179 - 192
  • [3] AT: an origin verification mechanism based on Assignment Track for securing BGP
    Wang, Na
    Zhi, Yingjian
    Wang, Binqiang
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5739 - 5745
  • [4] Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol
    Sharma, Gaurav
    Ragha, Lata
    2011 IEEE 5TH INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS), 2011,
  • [5] BGP path verification mechanism based on sanitizable signature
    Zhao, Chen
    Sun, Bin
    Yang, Yixian
    Yang, Yan
    International Journal of Digital Content Technology and its Applications, 2012, 6 (21) : 274 - 282
  • [6] Securing BGP - A Literature Survey
    Huston, Geoff
    Rossi, Mattia
    Armitage, Grenville
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (02): : 199 - 222
  • [7] Poster: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol
    Chen, Peixin
    Wang, Xiaofeng
    Wu, Yilun
    Su, Jinshu
    Zhou, Huan
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1632 - 1634
  • [8] Measures of self-similarity of BGP updates and implications for securing BGP
    Huston, Geoff
    Passive and Active Network Measurement, Proceedings, 2007, 4427 : 1 - 10
  • [9] Securing a path-coupled NAT/firewall signaling protocol
    Felis, Sebastian
    Stiemerling, Martin
    IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2007, 4786 : 61 - +
  • [10] Symbolic path-based protocol verification
    Liu, WC
    Chung, CG
    INFORMATION AND SOFTWARE TECHNOLOGY, 2000, 42 (04) : 245 - 255