DocumentCode :
1922048
Title :
Routing Protocol Security Using Symmetric Key Based Techniques
Author :
Bruhadeshwar, Bezawada ; Kothapalli, Kishore ; Poornima, M. ; Divya, M.
Author_Institution :
Center for Security, Theor. & Algorithmic Res., Int. Inst. of Inf. Technol., Hyderabad
fYear :
2009
fDate :
16-19 March 2009
Firstpage :
193
Lastpage :
200
Abstract :
In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control plane, a routing protocol, e.g., BGP, OSPF, exchanges routing state updates and enables routers to compute the best paths towards various destinations. During this phase, an attacker can modify or inject malicious control messages leading to incorrect computation of routing paths. In the data plane, the routers forward the data along the paths computed in the control plane. Even if an attacker is not successful during the control phase, he can choose not to use the correct routing paths and forward data along routes that benefit him. Research shows that, attacks on the control plane can be mitigated by ensuring message integrity and, attacks on the data plane can be mitigated by ensuring route integrity. Earlier works have addressed these two problems independently with many interesting solutions. However, due to the nature of these solutions, network architects cannot deploy security at both planes without increasing the overhead on the network. In this paper, we focus on an integrated approach and propose the use of symmetric key protocols for addressing the security at both the control and data planes. We describe approaches that enable the reuse of the symmetric key protocols thereby eliminating the need for separate solutions at different planes. We used symmetric key protocols as they are efficient and scalable. Our experimental results show that our approaches are practical and can be incrementally deployed as well.
Keywords :
Internet; cryptographic protocols; routing protocols; telecommunication security; Internet routing protocols; control plane; data plane; malicious control messages; message integrity; route integrity; routing protocol security; symmetric key based technique; symmetric key protocols; Access protocols; Availability; Communication system control; Data security; Degradation; Information security; Internet; Protection; Reliability theory; Routing protocols; BGP; OSPF; RIP; Security of Routing Protocols; Symmetric Key Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-3572-2
Electronic_ISBN :
978-0-7695-3564-7
Type :
conf
DOI :
10.1109/ARES.2009.147
Filename :
5066473
Link To Document :
بازگشت