2017
DOI: 10.1016/j.comcom.2017.03.007
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols

Abstract: The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently und… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Other BGPsec performance optimization techniques such as caching already computed AS path segments and their BGPsec signature validation results have been studied [36]. These techniques may be considered in future enhancements of NIST BGPsec implementation.…”
Section: High-speed Implementation Tarabgpsec™mentioning
confidence: 99%
“…Other BGPsec performance optimization techniques such as caching already computed AS path segments and their BGPsec signature validation results have been studied [36]. These techniques may be considered in future enhancements of NIST BGPsec implementation.…”
Section: High-speed Implementation Tarabgpsec™mentioning
confidence: 99%
“…BGPsec update processing are available [Adalier1] [Adalier2] [NIST-SRx]. Optimization 964 algorithms for BGPsec update processing are proposed and analyzed in [Sriram2]. 965…”
Section: Security Recommendation 33: Inbound Prefix Filtering For Leamentioning
confidence: 99%
“…These are believed to be the most promising solutions, due to the extensive security they offer. Although intuitive optimizations to these proposals have been discussed, e.g., using additional hardware [76] or caching update messages to reduce the number of signature verification operations [76,77,90,91], their expensive cryptographic operations remain a major obstacle to their adoption.…”
Section: Proposals Relying On Asymmetric Cryptographymentioning
confidence: 99%