2011 IEEE Symposium on Computers and Communications (ISCC) 2011
DOI: 10.1109/iscc.2011.5983852
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of impact of trust on Secure Border Gateway Protocol

Abstract: Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE message, an S-BGP speaker must verify nested signatures of all nodes in the traversed path; and the router should verify the Address Attestation to check if the source has the right to announce the address prefix. Due to several digital signatures required in each UPDATE, there is a high CPU overhead associated with S-BGP. In this paper, we propose a new approach that reduces the burden of validating the AS-path and the address… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 7 publications
(9 reference statements)
0
7
0
Order By: Relevance
“…The computation requirements of the protocol dramatically slow down the network convergence. In [1] the authors proposed Credible BGP (C-BGP), a lightweight protocol that we proved can be a good alternative to secure BGP. The main design goal of C-BGP is to reduce the burden of validating the AS-PATH and the address prefix origination.…”
Section: Credible Border Gateway Protocol (C-bgp)mentioning
confidence: 99%
See 3 more Smart Citations
“…The computation requirements of the protocol dramatically slow down the network convergence. In [1] the authors proposed Credible BGP (C-BGP), a lightweight protocol that we proved can be a good alternative to secure BGP. The main design goal of C-BGP is to reduce the burden of validating the AS-PATH and the address prefix origination.…”
Section: Credible Border Gateway Protocol (C-bgp)mentioning
confidence: 99%
“…As discussed in [1], there are significant savings in terms of number of signature verifications as they are reduced significantly when a limited number of trusted ASes are present in the network.…”
Section: Credible Border Gateway Protocol (C-bgp)mentioning
confidence: 99%
See 2 more Smart Citations
“…As well as they use both algorithm for key distribution central key distribution and distributed key distribution. The paper "Analysis of Impact of Trust on Secure Borde Gateway Protocol" [8] shows that only 20% of trusted nodes in the network can reduce the number of AS-path verifications by almost 50%. Similarly, the average number of IP prefix validations is reduced by 80% when 20% of the ASes are trusted.…”
Section: Problem Identificationmentioning
confidence: 99%