Title :
Application of logarithmic keying for securing ASPATH in inter-domain routing
Author :
Vidya, K. ; Uthariaraj, V. Rhymend
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India
Abstract :
Current day Internet is vulnerable to a variety of attacks during routing between Autonomous Systems (ASes). Routing between ASes in the internet is taken care of by standard de-facto inter-domain protocol called Border Gateway Protocol (BGP). BGP generally performs the hearsay technique for propagating the route for an IP prefix. Each BGP speaker advertises the AS -PATH through UPDATE messages for an IP prefix. The receiving BGP speaker of the neighboring AS append its own AS Number (ASN) in the existing AS-PATH and advertises it. But there is no guarantee in BGP that the received AS-PATH would have been modified, inserted or deleted. Hence AS path falsification is not detected by BGP. Various Security proposals were suggested by many researchers but none of them was deployed, due to various reasons. There exists a tradeoff between security, efficiency and performance in those proposals [1]. Due to their performance overheads and lack of proper security, we propose using Symmetric Key approaches for achieving perfect security. We consider the internet to be a combination of acyclic networks and star networks, where acyclic network is formed by the peer to peer ASes and customer-provider ASes [14| and star network is formed by an ISP providing services to many stub ASes. We apply a technique called logarithmic keying [2] to that combination of networks. The grand parent AS of each AS is trusted to identify the falsification of AS-Path. Also a temporal database is proposed to maintain historical advertisements at the Regional Internet Registry (RIR).
Keywords :
IP networks; Internet; peer-to-peer computing; public key cryptography; temporal databases; AS number; AS-PATH securing; BGP speaker; IP prefix; ISP providing services; acyclic networks; autonomous systems; border gateway protocol; customer-provider ASes; de-facto inter-domain protocol; inter-domain routing; logarithmic keying; peer to peer ASes; regional Internet registry; star network; star networks; symmetric key approaches; temporal database; Authentication; Databases; Forgery; IP networks; Proposals; Protection; Routing protocols; Security; Telecommunication traffic; Web and internet services;
Conference_Titel :
Advanced Computing, 2009. ICAC 2009. First International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-4786-2
Electronic_ISBN :
978-1-4244-4787-9
DOI :
10.1109/ICADVC.2009.5378314