A New Path Verification Protocol for Securing BGP

被引:0
|
作者
Wang, Na
Zhi, Yingjian
Wang, Binqiang
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes an ID-based Aggregate Path Verification protocol (IDAPV) to provide authenticity for route announcements in the Border Gateway (BGP) with a more efficient and easily deployed ID-based aggregate signature scheme instead of certificate-based scheme, which leads to performance and deployment matters of current proposals, and a secure key issuing protocol to hold the privacy of the system master key and router's private key in IDAPV, for in the ID-based cryptographic scheme, private key generator has the knowledge about these secrets, which is greatly risky in the real world. Compared with S-BGP, IDAPV simplifies key management process, consumes lesser memory and has shorter update message. Our simulation result indicates that convergence time of IDAPV with hardware implementation approximates BGP.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [21] Securing BGP Networks using Consistent Check Algorithm
    Man, C. K.
    Wong, K. Y.
    Yeung, K. H.
    IMECS 2009: INTERNATIONAL MULTI-CONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2009, : 387 - +
  • [22] On securing online registration protocols: Formal verification of a new proposal
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    KNOWLEDGE-BASED SYSTEMS, 2014, 59 : 149 - 158
  • [23] An operational approach to validate the path of BGP
    Li, Ping
    Zhou, Wanlei
    Li, Ke
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2008, 5022 : 133 - 143
  • [24] Design and simulation of a supplemental protocol for BGP
    Yeh, JH
    Zhang, W
    Hu, WC
    Lee, CW
    COMPUTER NETWORKS, 2005, 49 (02) : 172 - 200
  • [25] Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol
    Graham, Michelle
    Gray, David
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 160 - 171
  • [26] A plan-commit-prove protocol for secure verification of traversal path
    Ghosh, SK
    Ghosh, A
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 458 - 462
  • [27] Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
    Bruhadeshwar, Bezawada
    Kulkarni, Sandeep S.
    Liu, Alex X.
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 82 - +
  • [28] Data structure optimization of AS_PATH in BGP
    Jiang, WR
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 781 - 788
  • [29] Exploring the Benefit of Path Plausibility Algorithms in BGP
    Rodday, Nils
    Rodosek, Gabi Dreo
    Pras, Aiko
    van Rijswijk-Deij, Roland
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [30] Exploring the Benefit of Path Plausibility Algorithms in BGP
    Rodday, Nils
    Rodosek, Gabi Dreo
    Pras, Aiko
    Van Rijswijk - Deij, Roland
    Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024,