Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols

被引:1
|
作者
Sriram, Vinay K. [1 ]
Montgomery, Doug [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] NIST, Gaithersburg, MD 20899 USA
关键词
Routing security; Border Gateway Protocol security; BGPSEC; Performance optimization; Route processor efficiency;
D O I
10.1016/j.comcom.2017.03.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router. Published by Elsevier B.V.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 50 条
  • [21] A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with Reasoning
    Yan, Jingchen
    Ishibashi, Sho
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 210 - 215
  • [22] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Winderickx, Jori
    Braeken, An
    Singelee, Dave
    Mentens, Nele
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 137 - 149
  • [23] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Jori Winderickx
    An Braeken
    Dave Singelée
    Nele Mentens
    [J]. Journal of Cryptographic Engineering, 2022, 12 : 137 - 149
  • [24] Analysis of NIST Lightweight Cryptographic Algorithms Performance in IoT Security Environments based on MQTT
    Voloshyn, Volodymyr
    Khan, Mohammad S.
    Srivastava, Gautam
    Darshan, M.
    [J]. 2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [25] Power consumption analysis model in wireless sensor network for different topology protocols and lightweight cryptographic algorithms
    Radosavljević, Nemanja
    Babić, Djordje
    [J]. Journal of Internet Technology, 2021, 22 (01): : 71 - 80
  • [26] Power Consumption Analysis Model in Wireless Sensor Network for Different Topology Protocols and Lightweight Cryptographic Algorithms
    Radosavljevic, Nemanja
    Babic, Djordje
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (01): : 71 - 80
  • [27] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [28] A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
    Xi, Wei
    Suo, Siliang
    Cai, Tiantian
    Jian, Ganyang
    Yao, Hao
    Fan, Lin
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2307 - 2310
  • [29] Modular approach to the design and analysis of password-based security protocols
    DengGuo Feng
    WeiDong Chen
    [J]. Science in China Series F: Information Sciences, 2007, 50 : 381 - 398
  • [30] Modular approach to the design and analysis of password-based security protocols
    Feng DengGuo
    Chen WeiDong
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 381 - 398