Achieving Inter-domain Routing Security Based on Distributed Translator Trust Model
- School of Information Science and Technology
Southwest Jiaotong University, China
lingjk11@gmail.com - School of Information Science and Technology
Sun Yat-sen University, China
hongsh01@gmail.com - School of Computer Science
University of Adelaide,Australia
Abstract
To resolve the difficulties in deployment of the classic security solution S-BGP (Secure Border Gateway Protocol), the Translator Trust Model (TTM) for a new solution SE-BGP (Security Enhanced BGP) was proposed to transform the centralized deployment mode of S-BGP to distributed mode. However, the trust (attestations of routing information) translation of TTM only depends on a single hub node and this results in severe threats for the inter-domain routing system. To overcome the deficiencies of TTM, in this paper we improve TTM to Distributed TTM (DTTM) by expanding the single hub node to a set of selected multiple hub nodes; in our DTTM, the task of attestations is distributed over multiple hub nodes instead of on a single hub node. In order to make the hub nodes respond to the case of single node failures, we design a restoration mechanism to recover the network based on the neighbour-ring structure. Besides, we develop Cooperative Secure BGP (CSBGP) to realize DTTM in BGP. In comparison with SE-BGP, our experimental results show that CS-BGP achieves an improved scalability, reduced convergence time and enhanced security.
Key words
BGP security, TTM, DTTM, restoration mechanism, CS-BGP
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS140910057K
Publication information
Volume 12, Issue 4 (November 2015)
Special Issue on Recent Advances in Information Processing, Parallel and Distributed Computing
Year of Publication: 2015
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Kong, L., Shen, H.: Achieving Inter-domain Routing Security Based on Distributed Translator Trust Model. Computer Science and Information Systems, Vol. 12, No. 4, 1327–1344. (2015), https://doi.org/10.2298/CSIS140910057K