IBAPV: An Identity-Based Aggregate Path Verification Protocol for Securing BGP

被引:0
|
作者
Wang, Na [1 ]
Zhi, Yingjian [1 ]
Wang, Binqiang [1 ]
机构
[1] PLA Informat Engn Univ, Zhengzhou, Peoples R China
关键词
BGP; Interdomain routing; identity-based cryptography; security;
D O I
10.1109/ICCS.2008.4737331
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes an Identity-Based Aggregate Path Verification protocol (IBAPV) to provide authenticity for route announcements in the Border Gateway Protocol (BGP) with a more efficient and easily deployed identity-based aggregate signature scheme instead of certificate-based scheme, which leads to performance and deployment matters of current proposals. Because in the identity-based cryptographic scheme, private key generator has the knowledge about the system master key and private keys of all users in the system, which is greatly risky in the real world, a Distributed and Hierarchical Key Issuing protocol (DHKI) is proposed to hold the privacy of these secrets in IBAPV. Compared with S-BGP, IBAPV simplifies key management process, consumes lesser memory and has shorter update message. Our simulation result indicates that convergence time of IBAPV with hardware implementation approximates BGP.
引用
收藏
页码:987 / 993
页数:7
相关论文
共 50 条
  • [1] A New Path Verification Protocol for Securing BGP
    Wang, Na
    Zhi, Yingjian
    Wang, Binqiang
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 425 - 431
  • [2] Poster: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol
    Chen, Peixin
    Wang, Xiaofeng
    Wu, Yilun
    Su, Jinshu
    Zhou, Huan
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1632 - 1634
  • [3] Improvement of an Identity-Based Aggregate Signature Protocol from Lattice
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 258 - 263
  • [4] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [5] A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices
    Li, Quanrun
    Luo, Min
    Hsu, Chingfang
    Wang, Lianhai
    He, Debiao
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4816 - 4826
  • [6] AT: an origin verification mechanism based on Assignment Track for securing BGP
    Wang, Na
    Zhi, Yingjian
    Wang, Binqiang
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5739 - 5745
  • [7] Identity-based Cryptography for Securing Mobile Phone Calls
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
  • [8] Securing Internet of Drones With Identity-Based Proxy Signcryption
    Khan, Muhammad Asghar
    Shah, Habib
    Rehman, Sajjad Ur
    Kumar, Neeraj
    Ghazali, Rozaida
    Shehzad, Danish
    Ullah, Insaf
    IEEE ACCESS, 2021, 9 : 89133 - 89142
  • [9] Securing Mobile Phone Calls with Identity-Based Cryptography
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
  • [10] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):