Font Size: a A A

Research On Security Inter-domain Routing Protocol Based On Behavior And Identity Trust

Posted on:2013-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z R KangFull Text:PDF
GTID:2248330395955312Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Inter-domain routing protocol is a protocol that is used for autonomous systemboundary routers exchange routing information. The Border Gateway Protocol(BGP) isthe de facto standard inter-domain routing protocol in the Internet. Its security affectsthe security of entire network. At present, there are two kinds of research on BGPsecurity. One is using security enhance mechanism to verify the integrity of routinginformation and check the correctness of source address. The other is using anomalydetection mechanism to detect attacks. These methods can effectively improve security,but can not guarantee effective information sharing, achieve optimal routing and can notguarantee the confidentiality of information.This paper first studys the security threats BGP faced, analyzes advantages anddisadvantages of existing solutions. Then, it proposes two mechanisms to enhance thesecurity of inter-domain routing systems. One is TRBGP that is based on reputation.The other is HIBGP that is based on hash chain and indentity-based cryptographyscheme. By introducing the reputation and trust computing theory into BGP, TRBGPcan achieve effective information sharing and security storage. Using these basises,TRBGP proposes a reputation-based routing method to achieve the optimal routing.Based on hash chain, hash function and indentity-based cryptography scheme, HIBGPcan achieve indentity authentication and integrity and confidentiality of routinginformation. Finally, this paper analyzes the safety and performance of these twomechanisms and uses simulation experiments to prove the results. The results show that,TRBGP can ensure the security of routing information while also effectively ensure thecredibility of the routing behavior, HIBGP can achieve indentity authentication andintegrity and confidentiality of routing information with less computation.
Keywords/Search Tags:BGP, Reputation, Trusted Computing, Hash Chain, Indentity-based cryptography scheme
PDF Full Text Request
Related items