Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
The border gateway protocol (BGP) controls inter-domain routing in the
Internet. BGP is vulnerable to many attacks, since routers rely on
hearsay information from neighbors. Secure BGP (S-BGP) uses DSA to
provide route authentication and mitigate many of these
risks. However, many performance and deployment issues prevent S-BGP's
real-world deployment. Previous work has explored improving S-BGP
processing latencies, but space problems, such as increased message
size and memory cost, remain the major obstacles. In this paper, we
combine two efficient cryptographic techniques---signature
amortization and aggregate signatures---to design new aggregated path
authentication schemes. We propose six constructions for aggregated
path authentication that substantially improve efficiency of S-BGP's
path authentication on both speed and space criteria. Our performance
evaluation shows that the new schemes achieve such an efficiency that
they may overcome the space obstacles and provide a real-world
practical solution for BGP security.
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Meiyuan Zhao, Sean W. Smith, and David M. Nicol, "Aggregated Path Authentication for Efficient BGP Security." Dartmouth Computer Science Technical Report TR2005-541, May 2005.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.