Analysis of Impact of Trust on Secure Border Gateway Protocol

被引:0
|
作者
Israr, Junaid [1 ]
Guennoun, Mouhcine [1 ]
Mouftah, Hussein T. [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
关键词
S-BGP; Trust Model; Digital Signature;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE message, an S-BGP speaker must verify nested signatures of all nodes in the traversed path; and the router should verify the Address Attestation to check if the source has the right to announce the address prefix. Due to several digital signatures required in each UPDATE, there is a high CPU overhead associated with S-BGP. In this paper, we propose a new approach that reduces the burden of validating the AS-path and the address prefix origination. We define a control layer of trusted nodes that is comprised of major Autonomous Systems (ASes) in the network. In this environment, an AS has to verify only the signatures of intermediate ASes between itself and the last trusted node in the AS-path. Similarly, the address prefix is validated only if it was not previously validated by a trusted AS. Using an original analytical model as well as a simulation model, we measured performance metrics of the new proposal. We show that even with small ratio of trusted nodes, the new scheme can significantly reduce the number of verifications required to validate the AS-path and IP prefixes and the number of public keys required by S-BGP.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Border Gateway Protocol (S-BGP)
    Kent, S
    Lynn, C
    Seo, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 582 - 592
  • [2] Using Resource Public Key Infrastructure for Secure Border Gateway Protocol
    Chang, George
    Arianezhad, Majid
    Trajkovic, Ljiljana
    2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
  • [3] Public-Key Infrastructure for the secure Border Gateway Protocol (S-BGP)
    Seo, K
    Lynn, C
    Kent, S
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 239 - 253
  • [4] Analysis of Border Gateway Protocol (BGP) with Improvement in Byzantine Robustness
    Verma, Rahul Deo
    Samaddar, Shefalika Ghosh
    2018 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT'18), 2018,
  • [5] Interdomain routing and the border gateway protocol
    Bonaventure, O
    Feldmann, A
    Gao, LX
    Griffin, T
    Mao, ZM
    IEEE NETWORK, 2005, 19 (06): : 3 - 4
  • [6] Securing the border gateway routing protocol
    Smith, BR
    GarciaLunaAceves, JJ
    IEEE GLOBECOM 1996 - GLOBAL INTERNET'96, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 81 - 85
  • [7] ANTITRUST ANALYSIS FOR THE INTERNET UPSTREAM MARKET: A BORDER GATEWAY PROTOCOL APPROACH
    D'Ignazio, Alessio
    Giovannetti, Emanuele
    JOURNAL OF COMPETITION LAW & ECONOMICS, 2006, 2 (01) : 43 - 69
  • [8] A Fractional Model of the Border Gateway Protocol (BGP)
    Haxell, P. E.
    Wilfong, G. T.
    PROCEEDINGS OF THE NINETEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2008, : 193 - +
  • [9] Securing the Border Gateway Protocol: A status update
    Kent, ST
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 40 - 53
  • [10] Design and Analysis QoS VoIP using Routing Border Gateway Protocol (BGP)
    Ramadhan, Eko
    Firdausi, Ahmad
    Budiyanto, Setiyo
    2017 INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATION, WIRELESS SENSORS AND POWERING (BCWSP), 2017, : 17 - 20