2020
DOI: 10.3390/s20164482
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Border Gateway Protocol Security Using Public Blockchain

Abstract: Communication on the Internet consisting of a massive number of Autonomous Systems (AS) depends on routing based on Border Gateway Protocol (BGP). Routers generally trust the veracity of information in BGP updates from their neighbors, as with many other routing protocols. However, this trust leaves the whole system vulnerable to multiple attacks, such as BGP hijacking. Several solutions have been proposed to increase the security of BGP routing protocol, most based on centralized Public Key Infrastructure, bu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Border Gateway Protocol (BGP) provides the legislation of IP-packets connectivity and transportation among autonomous systems through forwarding to their desired destination, which is known as the de-facto inter-domain routing protocol of the network [29]. The accuracy and validity of packet route announcements are not verified in BGP management [30] where multiple large-scale networks are interconnected without a traffic controller or administrating system. Due to inefficient routing management, the optimal route for data packets to travel to their targeted IP address is not determined, and data packets may take a long time to reach the desired destination or may never arrive.…”
Section: Centralization Attackmentioning
confidence: 99%
“…Border Gateway Protocol (BGP) provides the legislation of IP-packets connectivity and transportation among autonomous systems through forwarding to their desired destination, which is known as the de-facto inter-domain routing protocol of the network [29]. The accuracy and validity of packet route announcements are not verified in BGP management [30] where multiple large-scale networks are interconnected without a traffic controller or administrating system. Due to inefficient routing management, the optimal route for data packets to travel to their targeted IP address is not determined, and data packets may take a long time to reach the desired destination or may never arrive.…”
Section: Centralization Attackmentioning
confidence: 99%
“…Nowadays there are many tools for the analysis of vulnerabilities in smart contracts and new ones appearing all the time. We have focused in this work on analyzing vulnerabilities in the source code of smart contracts, although there are other works that focus on vulnerabilities in consensus protocols, such as [19,20] or formal verification tools like [21].…”
Section: Background and Related Workmentioning
confidence: 99%
“…For many years, many such protocols used timestamps. In addition, security protocols can be used in IoT systems [ 1 , 2 , 3 , 4 , 5 ]. It is necessary for the appropriate time-dependent management of cryptographic primitives (keys, passwords), especially to preserve and monitor the validity (lifetime) of the primitives.…”
Section: Introductionmentioning
confidence: 99%