• DocumentCode
    1008367
  • Title

    Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks

  • Author

    Lee, Patrick P C ; Misra, Vishal ; Rubenstein, Dan

  • Author_Institution
    Columbia Univ., New York
  • Volume
    15
  • Issue
    6
  • fYear
    2007
  • Firstpage
    1490
  • Lastpage
    1501
  • Abstract
    To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple paths so that intruders require much more resources to mount successful attacks. Our work exhibits several important properties that include: (1) routing decisions are made locally by network nodes without the centralized information of the entire network topology; (2) routing decisions minimize throughput loss under a single-link attack with respect to different session models; and (3) routing decisions address multiple link attacks via lexicographic optimization. We devise two algorithms termed the Bound-Control algorithm and the Lex-Control algorithm, both of which provide provably optimal solutions. Experiments show that the Bound-Control algorithm is more effective to prevent the worst-case single-link attack when compared to the single-path approach, and that the Lex-Control algorithm further enhances the Bound-Control algorithm by countering severe single-link attacks and various types of multi-link attacks. Moreover, the Lex-Control algorithm offers prominent protection after only a few execution rounds, implying that we can sacrifice minimal routing protection for significantly improved algorithm performance. Finally, we examine the applicability of our proposed algorithms in a specialized defensive network architecture called the attack-resistant network and analyze how the algorithms address resiliency and security in different network settings.
  • Keywords
    distributed algorithms; multi-access systems; multicast communication; security of data; telecommunication network routing; telecommunication security; attack-resistant network; bound-control algorithm; data routing decision; defensive network architecture; distributed algorithm; distributed secure multipath solution; lex-control algorithm; lexicographic optimization; multilink attack; multiple link attack; network setting resiliency; network setting security; network topology; secure multipath routing; single-link attack; single-path data session; Algorithm design and analysis; Computer science; Data security; Distributed algorithms; Network topology; Peer to peer computing; Protection; Resilience; Routing protocols; Throughput; Attack-resistant networks; maximum-flow problems; multipath routing; optimization; preflow-push; resilience; security;
  • fLanguage
    English
  • Journal_Title
    Networking, IEEE/ACM Transactions on
  • Publisher
    ieee
  • ISSN
    1063-6692
  • Type

    jour

  • DOI
    10.1109/TNET.2007.897956
  • Filename
    4402892