The Trusted and Decentralized Network Resource Management

被引:13
作者
Liu, Shuai [1 ]
Yang, Fei [2 ]
Li, Dandan [1 ]
Bagnulo, Marcelo [3 ]
Liu, Bingyang [2 ]
Huang, Xiaohong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Inst Network Technol, Beijing, Peoples R China
[2] Huawei Technol Co Ltd, Shenzhen, Peoples R China
[3] Univ Carlos III Madrid, Madrid, Spain
来源
2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020) | 2020年
基金
国家重点研发计划;
关键词
resource; trusted; decentralized; Ethereum;
D O I
10.1109/icccn49398.2020.9209590
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network resource management relies on trusted infrastructures. However, current trusted infrastructures have centralized or hierarchical structures where root nodes often have privileges over subtrees. Hacked or malicious roots may affect subtrees by modifying IP ownership, routing and so on. Therefore, a trusted and decentralized network resource management becomes crucial. The emergence of blockchain such as Ethereum becomes a leading candidate for achieving trusted and decentralized network resource management. In this paper, based on Ethereum, we design a trusted authentication scheme that includes voting policy, endorsement, credibility model and rebinding mechanism to ensure the credibility of entities. Our scheme can allocate, delegate and transfer network resources in a trusted and decentralized style. The experimental results verify the feasibility and security of our scheme. When an entity is hacked or malicious, its endorsement authentication is revoked and the entity does not have the right to manage the network resources. In addition, the overhead increased by the trusted authentication scheme is within a reasonable range.
引用
收藏
页数:7
相关论文
共 10 条
[1]  
Angieri S., 2018, ARXIV180710528
[2]  
Bogner A., 2016, Proceedings of the 6th International Conference on the Internet of Things-IoT'16, P177, DOI [DOI 10.1145/2991561.2998465, 10.1145/2991561.2998465]
[3]  
Cooper D., 2013, P 12 ACM WORKSH HOT, P1
[4]   The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet [J].
Hari, Adiseshu ;
Lakshman, T. V. .
PROCEEDINGS OF THE 15TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '16), 2016, :204-210
[5]   From the Consent of the Routed: Improving the Transparency of the RPKI [J].
Heilman, Ethan ;
Cooper, Danny ;
Reyzin, Leonid ;
Goldberg, Sharon .
SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, :51-62
[6]   IPchain: Securing IP Prefix Allocation and Delegation with Blockchain [J].
Paillisse, Jordi ;
Ferriol, MiQuel ;
Garcia, Eric ;
Latif, Hamid ;
Piris, Carlos ;
Lopez, Albert ;
Kuerbis, Brenden ;
Rodriguez-Natal, Alberto ;
Ermagan, Vina ;
Maino, Fabio ;
Cabellos, Albert .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1236-1243
[7]  
Saad M, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), P210, DOI [10.1109/BLOC.2019.8751229, 10.1109/bloc.2019.8751229]
[8]  
Sajana P., 2018, INT J PURE APPL MATH, V118, P2965
[9]   Towards Detecting BGP Route Hijacking using the RPKI [J].
Waehlisch, Matthias ;
Maennel, Olaf ;
Schmidt, Thomas C. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) :103-104
[10]   BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution [J].
Xing, Qianqian ;
Wang, Baosheng ;
Wang, Xiaofeng .
SYMMETRY-BASEL, 2018, 10 (09)