Analysis of Impact of Trust on Secure Border Gateway Protocol

被引:0
|
作者
Israr, Junaid [1 ]
Guennoun, Mouhcine [1 ]
Mouftah, Hussein T. [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
关键词
S-BGP; Trust Model; Digital Signature;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE message, an S-BGP speaker must verify nested signatures of all nodes in the traversed path; and the router should verify the Address Attestation to check if the source has the right to announce the address prefix. Due to several digital signatures required in each UPDATE, there is a high CPU overhead associated with S-BGP. In this paper, we propose a new approach that reduces the burden of validating the AS-path and the address prefix origination. We define a control layer of trusted nodes that is comprised of major Autonomous Systems (ASes) in the network. In this environment, an AS has to verify only the signatures of intermediate ASes between itself and the last trusted node in the AS-path. Similarly, the address prefix is validated only if it was not previously validated by a trusted AS. Using an original analytical model as well as a simulation model, we measured performance metrics of the new proposal. We show that even with small ratio of trusted nodes, the new scheme can significantly reduce the number of verifications required to validate the AS-path and IP prefixes and the number of public keys required by S-BGP.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Border gateway protocol graph: Detecting and visualising Internet routing anomalies
    Papadopoulos, Stavros
    Moustakas, Konstantinos
    Drosou, Anastasios
    Tzovaras, Dimitrios
    IET Information Security, 2016, 10 (03): : 125 - 133
  • [42] Optimal Trained Hybrid Classifier for Border Gateway Protocol Anomaly Detection
    Sunita, M.
    Sujata, V
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2022, 13 (01)
  • [43] Optimal detection of border gateway protocol anomalies with extensive feature set
    M. Sunita
    Sujata V. Mallapur
    Multimedia Tools and Applications, 2024, 83 : 50893 - 50919
  • [44] Verification of Secure Gateway Selection Protocol Using PI-Calculus
    Rai, Abhay Kumar
    Tewari, Rajiv Ranjan
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [45] GradeTrust: A Secure Trust Based Routing Protocol For MANETs
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 65 - 70
  • [46] Constructing secure routing protocol using trust model
    Yu, Wang-Ke
    Ma, Wen-Ping
    Yan, Ya-Jun
    Yang, Yuan-Yuan
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (03): : 48 - 51
  • [47] Receive wireless sensor data through IoT gateway using web client based on border gateway protocol
    Yan, Meng
    HELIYON, 2024, 10 (11)
  • [48] Optical routing border gateway protocol-based advance lightpath setup
    Hafid, A
    Abdelilah, M
    Mazen, KG
    Drissi, J
    2005 Systems Communications, Proceedings: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 223 - 228
  • [49] Introduction to The Border Gateway Protocol - Case Study using GNS3
    Narasimhan, Sreenivasan
    Latchman, Haniph
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 315 - 320
  • [50] Secure Email Gateway
    Om, Khandu
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2017, : 49 - 53