A Novel Secure Inter-Domain Routing for Identifier/Locator Split Network

Article Preview

Abstract:

With the rapid development of the Internet, the de facto inter-domain routing protocol, Border Gateway Protocol (BGP), has become very vulnerable to many attacks. For this, several secure inter-domain protocols have been proposed, most of which are focus on addressing the issue of faking AS path, but cannot address other issues, such as violating routing policies, reachability attacks and so on. Based on the concept of identifier/locator split and routing isolation, we have proposed a secure identifier-based inter-domain Routing, SIR [, which can provide control plane security without using the high overhead mechanism. Then, we here optimize SIR and propose another secure inter-domain routing, Optimized SIR (O-SIR), which introduces a checked path table and records the path which has been checked before in each AS. We present the simulations based on the real world datasets CAIDA and compare the performance between SIR and O-SIR by different deployments and different position of attacks. The results show that O-SIR can reduce 18%-45% communication cost of verifying paths with additional below 0.1% routing table size.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

653-661

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Liu, Z. Liu, B. Wang and Q. Yang. SIR: A Secure Identifier-based Inter-domain Routing for Identifier/Locator Split Network IEICE Transaction on Communication, Vol. E96-B, No. 07, Jul. (2013).

DOI: 10.1587/transcom.e96.b.1742

Google Scholar

[2] R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture, IETF Internet Standard, RFC 4423, May (2006).

DOI: 10.17487/rfc4423

Google Scholar

[3] J. Pan, S. Paul, R. Jain, and M. Bowman, MILSA: A New EvolutionaryArchitecture for Scalability, Mobility, and Multihoming in the FutureInternet, Selected Areas in Communications, IEEE Journal on, Vol. 28, No. 8, p.1344–1362, Oct. (2010).

DOI: 10.1109/jsac.2010.101012

Google Scholar

[4] D. Farinacci, D. Fuller, D. Oran, and D. Meyer, Locator/ID separationprotocol (LISP), IETF Internet Draft, draft-farinacci-lisp-12. txt, Sep. (2009).

DOI: 10.17487/rfc6832

Google Scholar

[5] T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfarl, and D. Kuptsov. Architecting for Innovation. ACM SIGCOMM Computer Communication Review, pp.24-36 Vol. 41, No. 3, Jul. (2011).

DOI: 10.1145/2002250.2002256

Google Scholar

[6] X. Zhang, H. Hsiao, G. Hasker, H. Chan, A. Perrig and D. Andersen. SCION: Scalability, Control, and Isolation OnNext-Generation Networks. IEEE Symposium on Security and Privacy 2011, pp.212-227. (2011).

DOI: 10.1109/sp.2011.45

Google Scholar

[7] Y. Rekhter. A Border Gateway Protocol 4 (BGP-4), 2006. RFC 4271.

Google Scholar

[8] P. Godfrey, S. Shenker, and I. Stoica. Pathlet Routing. In Proc. HotNets, (2008).

Google Scholar

[9] S. Kent, C. Lynn, and K. Seo, Secure border gateway protocol (SBGP), IEEE Journal on Selected Areas in Communications, Vol. 18, No. 4, p.582–592, (2000).

DOI: 10.1109/49.839934

Google Scholar

[10] R. White, Securing BGP through secure origin BGP (soBGP), Business Communications Review, Vol. 33, No. 5, p.47–53, (2003).

Google Scholar

[11] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. InProc. CoNEXT, (2009).

DOI: 10.1145/1658939.1658941

Google Scholar

[12] M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica, andS. Shenker, ROFL: Routing on Flat Labels, in SIGCOMM, 2006, p.363–374.

DOI: 10.1145/1151659.1159955

Google Scholar

[13] MobilityFirst Future Internet Architecture Project, http: /mobilityfirst. winlab. rutgers. edu.

Google Scholar

[14] T. Vu, A. Baid, Y. Zhang, T. D. Nguyeny, J. Fukuyamaz, R. P. Martin , D. Raychaudhuri. DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet. ICDCS (2012).

DOI: 10.1109/icdcs.2012.50

Google Scholar

[15] C. Vogt, Six/one router: a scalable and backwards compatible solutionfor provider-independent addressing, in Proceedings of MobiArch '08, 2008, p.13–18.

DOI: 10.1145/1403007.1403011

Google Scholar

[16] K. Butler, P. McDaniel, and J. Rexford, A Survey of BGP Security Issues and Solutions. In Proc. the IEEE Vol. 98, No. 1, Jan. (2010).

DOI: 10.1109/jproc.2009.2034031

Google Scholar

[17] Y. Song, L. Gao. Identifying and Addressing Reachability and Policy. Technical Report, University of Massachusetts, (2012).

Google Scholar

[18] T. Dierks. The Transport Layer Security (TLS) ProtocolVersion 1. 2, RFC 5246. August (2008).

Google Scholar

[19] L. Gao, J. Rexford. Stable Internet Routing Without Global Coordination. IEEE/ACM Transactions on networking, Vol. 9, No. 6, pp.681-692, Dec. (2001).

DOI: 10.1109/90.974523

Google Scholar

[20] S. Goldberg,M. Schapira,P. Hummon, J. Rexford. How Secure are Secure Interdomain Routing Protocols?. Sigcomm (2010).

DOI: 10.1145/1851182.1851195

Google Scholar

[21] BGP Simulator, 2008. [Online]. Available: http: /www. cs. unm. edu/~karlinjf/pgbgp.

Google Scholar