A DSA-based and Efficient Scheme for Preventing IP Prefix Hijacking

被引:0
作者
Yang, Bo [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Peoples R China
来源
2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG) | 2014年
关键词
IP prefix hijacking; DSA; Certificates; Multi-exponentiation; BGP;
D O I
10.1109/ICMeCG.2014.27
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
IP prefix hijacking poses a serious threat the security of the Internet. Cryptographic authenticating origin ASes (Autonomous Systems) of advertised prefix, which is an effective way of preventing IP prefix hijacking, has received wide acceptance. However, these existing schemes received various critical comments on their inefficiency when cryptographic authenticating origin ASes. For improving efficiency, we take full advantage of specific characteristics of DSA (Digital Signature Algorithm) and thus present a scheme for preventing IP prefix hijacking. There are two characteristics, which are DSA-based and efficient, in the proposed scheme. Firstly, because DSA is an United States Federal Government standard for digital signatures, the DSA-based can maintain compatibility with the DSA and its analytical tools, and thus it is easier for proposed scheme to be widely accepted and applied into practice. Secondly, public key certificates are not necessary because public keys can be computed by using a formula. Separated verifying signatures in these certificates, which is inevitable in almost all existing cryptography-based schemes, can be replaced with computing of a multi-exponentiation fomula. Thus, the efficient is achieved.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2009, FIPS1863
[2]  
Austein R., 2012, MANIFESTS R IN PRESS
[3]  
Bono V. J., 7007 EDXPLANATION AP
[4]  
Butler K, 2010, P IEEE, V98, P100, DOI 10.1109/JPROC.2009.2034031
[5]  
Cowie J., Rensys blog: China's 18-minute mystery
[6]   How Secure are Secure Interdomain Routing Protocols? [J].
Goldberg, Sharon ;
Schapira, Michael ;
Hummon, Peter ;
Rexford, Jennifer .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) :87-98
[7]   SPV: Secure Path Vector routing for securing BGP [J].
Hu, YC ;
Perrig, A ;
Sirbu, M .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) :179-192
[8]   Securing BGP - A Literature Survey [J].
Huston, Geoff ;
Rossi, Mattia ;
Armitage, Grenville .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (02) :199-222
[9]   Autonomous security for autonomous systems [J].
Karlin, Josh ;
Forrest, Stephanie ;
Rexford, Jennifer .
COMPUTER NETWORKS, 2008, 52 (15) :2908-2923
[10]   Secure Border Gateway Protocol (S-BGP) [J].
Kent, S ;
Lynn, C ;
Seo, K .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :582-592