DocumentCode :
1418998
Title :
Symmetric Key Approaches to Securing BGP—A Little Bit Trust Is Enough
Author :
Bruhadeshwar, Bezawada ; Kulkarni, Sandeep S. ; Liu, Alex X.
Author_Institution :
Int. Inst. of Inf. Technol., Hyderabad, India
Volume :
22
Issue :
9
fYear :
2011
Firstpage :
1536
Lastpage :
1549
Abstract :
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP is vulnerable to a variety of attacks due to lack of security mechanisms in place. Many BGP security mechanisms have been proposed. However, none of them has been deployed because of either high cost or high complexity. The right trade-off between efficiency and security has been ever challenging. In this paper, we attempt to trade-off between efficiency and security by giving a little dose of trust to BGP routers. We present a new flexible threat model that assumes for any path of length h, at least one BGP router is trustworthy, where h is a parameter that can be tuned according to security requirements. Based on this threat model, we present two new symmetric key approaches to securing BGP: the centralized key distribution approach and the distributed key distribution approach. Comparing our approaches to the previous SBGP scheme, our centralized approach has a 98 percent improvement in signature verification. Our distributed approach has equivalent signature generation cost as in SBGP and an improvement of 98 percent in]signature verification. Comparing our approaches to the previous SPV scheme, our centralized approach has a 42 percent improvement in signature generation and a 96 percent improvement in signature verification. Our distributed approach has a 90 percent improvement on signature generation cost and a 95 percent improvement in signature verification cost. We also describe practical techniques for increasing the long-term security and collusion resistance of our key distribution protocols without increasing the signature generation and verification costs. By combining our approaches with previous public key approaches, it is possible to simultaneously provide an increased level of security and reduced computation cost.
Keywords :
Internet; computer network security; digital signatures; internetworking; public key cryptography; routing protocols; BGP router; BGP security; Internet infrastructure; autonomous systems; border gateway protocol; centralized key distribution approach; distributed key distribution approach; interdomain routing protocol; public key approaches; signature generation cost; signature verification; symmetric key approach; Authentication; IP networks; Public key; Routing; Routing protocols; Border gateway protocol; collusion resistance.; routing security; symmetric key distribution protocols;
fLanguage :
English
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
Publisher :
ieee
ISSN :
1045-9219
Type :
jour
DOI :
10.1109/TPDS.2011.19
Filename :
5680898
Link To Document :
بازگشت