skip to main content
10.1145/1966913.1966927acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Enhancing the trust of internet routing with lightweight route attestation

Published: 22 March 2011 Publication History

Abstract

The weak trust model in Border Gateway Protocol (BGP) introduces severe vulnerabilities for Internet routing including active malicious attacks and unintended misconfigurations. Although various secure BGP solutions have been proposed, they share similar weaknesses such as high complexity of security enforcement and incapability of data-plane attack prevention. We propose TBGP, a trusted BGP scheme aiming to achieve high authenticity of Internet routing with a simple and lightweight attestation mechanism. TBGP introduces a set of route update and withdrawal rules that, if correctly enforced by each router, can guarantee the authenticity and integrity of route information that is announced to other routers in the Internet. Through this, TBGP builds a transitive trust relationship among all routers on a routing path. We implement a prototype of TBGP to investigate its practicality. In our implementation, we use identity-based signature (IBS) and trusted computing (TC) techniques to further reduce the complexity of security operations. The performance study show that TBGP can achieve significantly better convergence performance and lower computation overhead than existing secure BGP solutions.

References

[1]
GNU Zebra. http://http://www.zebra.org/.
[2]
Shamus software ltd, MIRACL. http://www.shamus.ie/.
[3]
SSF network models (SSFNet). http://www.ssfnet.org/homePage.html.
[4]
TPM emulator. http://tpm-emulator.berlios.de.
[5]
Trusted computing group. https://www.trustedcomputinggroup.org/.
[6]
Youtube hijacking: A RIPE NCC RIS case study. http://www.ripe.net/news/study-youtube-hijacking.html.
[7]
N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems, 8(1), 2008.
[8]
W. Aiello, J. Ioannidis, and P. McDaniel. Origin authentication in interdomain routing. In Proc. of the ACM CCS, pages 165--178, 2003.
[9]
A. Beimel and B. Chor. Universally ideal secret sharing schemes. IEEE Trans. on Info. Theory, 40(3), 1994.
[10]
J. Caballero, T. Kampouris, D. Song, and J. Wang. Would diversity really increase the robustness of the routing infrastructure against software defects? In Proc. of the ISOC NDSS, 2008.
[11]
N. Feamster and H. Balakrishnan. Detecting bgp configuration faults with static analysis. In Proc. of the NSDI, 2005.
[12]
S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright. Rationality and traffic attraction: Incentives for honest path announcements in BGP. In Proc. of the ACM SIGCOMM, pages 267--278, 2008.
[13]
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proc. of the ISOC NDSS, pages 75--85, 2003.
[14]
T. G. Griffin, F. B. Shepherd, and G. Wilfong. The stable paths problem and interdomain routing. IEEE/ACM Transactions on Networking, 10(2):232--243, 2002.
[15]
R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-bot: Improving service availability in the face of botnet attacks. In Proc. of the NSDI, 2009.
[16]
A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. Netreview: Detecting bgp configuration faults with static analysis. In Proc. of the NSDI, 2009.
[17]
X. Hu and Z. M. Mao. Accurate real-time identification of IP prefix hijacking. In Proc. of the IEEE Symposium on Security and Privacy, 2007.
[18]
Y. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing bgp. In Proc. of the ACM SIGCOMM, pages 179--192, 2004.
[19]
J. Karlin, S. Forrest, and J. Rexford. Pretty good bgp: Improving BGP by cautiously adopting routes. In Proc. of the IEEE ICNP, pages 290--299, 2006.
[20]
E. Keller, M. Yu, M. Caesar, and J. Rexford. Virtually eliminating router bugs. In Proc. of the ACM CoNext, 2009.
[21]
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol. IEEE JSAC, 18(4):582--592, 2000.
[22]
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: a prefix hijack alert system. In Proc. of the USENIX Security Symposium, 2006.
[23]
Q. Li, M. Xu, J. Wu, X. Zhang, Patrick P. C. Lee, and K. Xu. Enhancing the trust of internet routing with lightweight route attestation. Tsinghua CS Technical Report, 2010.
[24]
Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (BGP-4). RFC 4271, 2006.
[25]
P. Reynolds, O. Kennedy, E. G. Sirer, and F. B. Schneider. Securing BGP using external security monitors. Cornell University, Computing and Information Science, Technical Report TR2006-2065, 2006.
[26]
A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of Crypto, pages 47--53, 1984.
[27]
E. Shi, A. Perrig, and L. van Doorn. BIND: A fine-grained attestation service for secure distributed systems. In Proc. of the IEEE Symposium on Security and Privacy, pages 154--168, 2005.
[28]
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. of the NSDI, 2004.
[29]
W. Sun, Z. Mao, and K. Shin. Differentiated bgp update processing for improved routing convergence. In Proc. of the ICNP, 2006.
[30]
P. C. van Oorschot, T. Wan, and E. Kranakis. On inter-domain routing security and pretty secure BGP (psBGP). ACM TISSEC, 10(3):1--41, 2007.
[31]
R. White. Through secure origin BGP. The Internet Protocol Journal, 6(3):15--22, 2003.
[32]
Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush. ispy: Detecting IP prefix hijacking on my own. In Proc. of the ACM SIGCOMM, 2008.
[33]
M. Zhao, S. W. Smith, and D. M. Nicol. The performance impact of BGP security. IEEE Network, 19(6):42--48, 2005.

Cited By

View all
  • (2015)A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2015.01.01780:C(1-26)Online publication date: 7-Apr-2015
  • (2014)Diagnosis of route leaks among autonomous systems in the Internet2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)10.1109/SaCoNeT.2014.6867765(1-6)Online publication date: Jun-2014
  • (2012)Relieve Internet Routing Security of Public Key Infrastructure2012 21st International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN.2012.6289235(1-9)Online publication date: Jul-2012

Index Terms

  1. Enhancing the trust of internet routing with lightweight route attestation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
    March 2011
    527 pages
    ISBN:9781450305648
    DOI:10.1145/1966913
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 March 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. BGP
    2. hijacking
    3. prevention
    4. routing
    5. secure BGP

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '11
    Sponsor:

    Acceptance Rates

    ASIACCS '11 Paper Acceptance Rate 35 of 217 submissions, 16%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2015.01.01780:C(1-26)Online publication date: 7-Apr-2015
    • (2014)Diagnosis of route leaks among autonomous systems in the Internet2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)10.1109/SaCoNeT.2014.6867765(1-6)Online publication date: Jun-2014
    • (2012)Relieve Internet Routing Security of Public Key Infrastructure2012 21st International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN.2012.6289235(1-9)Online publication date: Jul-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media