Credible-BGP: A Hybrid Cryptosystem to Secure BGP

被引:0
|
作者
Israr, Junaid [1 ]
Guennoun, Mouhcine [1 ]
Mouftah, Hussein T. [1 ]
Rahman, Sk Md Mizanur [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
关键词
SBGP; Hybrid Cryptosystem; Trust;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol. Among them, SBGP offer secure and guaranteed means to distribute route reachability information. However, the assumption under which the protocol is built resulted in a significant computational overhead due to extensive use of cryptographic operations. Indeed, upon the reception of an update, a node has to verify the embedded signature of each node in the AS-PATH in an onion fashion. In this paper, we present a novel approach that reduces the cost of construction and verifications of BGP updates. We make the assumption that some ASes (Like Tier-1 ISPs) can be considered to be trusted by the rest of the ASes. We build a new protocol that employs symmetric and asymmetric cryptosystems to build a secure and efficient mechanism to distribute route information. Based on simulation studies, we noticed considerable reduction of the cost of update construction and verification despite a slight increase of the messages exchanged to reach the steady state.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Credible BGP - Extensions to BGP for Secure Networking
    Israr, Junaid
    Guennoun, Mouhcine
    Mouftah, Hussein T.
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 212 - 216
  • [2] Modeling adoptability of secure BGP protocols
    Chan, Haowen
    Dash, Debabrata
    Perrig, Adrian
    Zhang, Hui
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 279 - 290
  • [3] λBGP: Rethinking BGP programmability
    Hart, Nicholas
    Rotsos, Charalampos
    Giotsas, Vasileios
    Race, Nicholas
    Hutchison, David
    [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [4] Secure Border Gateway Protocol (S-BGP)
    Kent, S
    Lynn, C
    Seo, K
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 582 - 592
  • [5] On interdomain routing security and pretty secure BGP (psBGP)
    van Oorschot, P. C.
    Wan, Tao
    Kranakis, Evangelos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [6] SPV: Secure Path Vector routing for securing BGP
    Hu, YC
    Perrig, A
    Sirbu, M
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 179 - 192
  • [7] Identifying and Addressing Reachability and Policy Attacks in "Secure" BGP
    Song, Yang
    Venkataramani, Arun
    Gao, Lixin
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2986 - 2999
  • [8] Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
    Song, Yang
    Venkataramani, Arun
    Gao, Lixin
    [J]. 2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 550 - 559
  • [9] Path stability in partially deployed secure BGP routing
    Yang, Yan
    Shi, Xingang
    Ma, Qiang
    Li, Yahui
    Yin, Xia
    Wang, Zhiliang
    [J]. COMPUTER NETWORKS, 2022, 206
  • [10] Detecting BGP misconfiguration for BGP/MPLS VPNs
    Liang, HY
    Teng, GW
    Wang, HJ
    Gao, Y
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 168 - 170