scholarly journals Achieving inter-domain routing security based on distributed translator trust model

2015 ◽  
Vol 12 (4) ◽  
pp. 1327-1344
Author(s):  
Lingjing Kong ◽  
Hong Shen

To resolve the difficulties in deployment of the classic security solution S-BGP (Secure Border Gateway Protocol), the Translator Trust Model (TTM) for a new solution SE-BGP (Security Enhanced BGP) was proposed to transform the centralized deployment mode of S-BGP to distributed mode. However, the trust (attestations of routing information) translation of TTM only depends on a single hub node and this results in severe threats for the inter-domain routing system. To overcome the deficiencies of TTM, in this paper we improve TTM to Distributed TTM (DTTM) by expanding the single hub node to a set of selected multiple hub nodes; in our DTTM, the task of attestations is distributed over multiple hub nodes instead of on a single hub node. In order to make the hub nodes respond to the case of single node failures, we design a restoration mechanism to recover the network based on the neighbour-ring structure. Besides, we develop Cooperative Secure BGP (CSBGP) to realize DTTM in BGP. In comparison with SE-BGP, our experimental results show that CS-BGP achieves an improved scalability, reduced convergence time and enhanced security.

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Gao ◽  
Wenfen Liu

With the rapid development and application of medical sensor networks, the security has become a big challenge to be resolved. Trust mechanism as a method of “soft security” has been proposed to guarantee the network security. Trust models to compute the trustworthiness of single node and each path are constructed, respectively, in this paper. For the trust relationship between nodes, trust value in every interval is quantified based on Bayesian inference. A node estimates the parameters of prior distribution by using the collected recommendation information and obtains the posterior distribution combined with direct interactions. Further, the weights of trust values are allocated through using the ordered weighted vector twice and overall trust degree is represented. With the associated properties of Tsallis entropy, the definition of path Tsallis entropy is put forward, which can comprehensively measure the uncertainty of each path. Then a method to calculate the credibility of each path is derived. The simulation results show that the proposed models can correctly reflect the dynamic of node behavior, quickly identify the malicious attacks, and effectively avoid such path containing low-trust nodes so as to enhance the robustness.


2013 ◽  
Vol 750 ◽  
pp. 64-67
Author(s):  
Wen Yu Zhang ◽  
Dong Ying Ju ◽  
Yao Yao ◽  
Hong Yang Zhao ◽  
Xiao Dong Hu ◽  
...  

In this paper, the established control system and its control algorism of a new twin roll strip caster developed by authors is presented. It is illustrated the roll-gap control strategy of the twin roll strip caster based on a feed forward-feedback system. From the experimental results, the susceptibility of control convergence time, stable and accurate are shown on a higher level than traditional control strategy.


Author(s):  
Akinboro Solomon ◽  
Emmanuel Olajubu ◽  
Ibrahim Ogundoyin ◽  
Ganiyu Aderounmu

This study designed, simulated and evaluated the performance of a conceptual framework for ambient ad hoc home network. This was with a view to detecting malicious nodes and securing the home devices against attacks. The proposed framework, called mobile ambient social trust consists of mobile devices and mobile ad hoc network as communication channel. The trust model for the device attacks is Adaptive Neuro Fuzzy (ANF) that considered global reputation of the direct and indirect communication of home devices and remote devices. The model was simulated using Matlab 7.0. In the simulation, NSL-KDD dataset was used as input packets, the artificial neural network for packet classification and ANF system for the global trust computation. The proposed model was benchmarked with an existing Eigen Trust (ET) model using detection accuracy and convergence time as performance metrics. The simulation results using the above parameters revealed a better performance of the ANF over ET model. The framework will secure the home network against unforeseen network disruption and node misbehavior.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 203
Author(s):  
Arushi Agarwal ◽  
Ayushi Pandey

Border Gateway Protocol (BGP) is an exterior gateway routing protocol used between various autonomous systems across the internet. BGP helps in selecting the best route for the transmission of data among the users. The transmission policy followed by BGP should be such that it should increase BGP routing performances. This work aims to reduce the convergence time of the network with the improvement of QOS (Quality of Service) in the routing of Border Gateway Protocol. Our results show that we can obtain a reduced framework environment which has a best routing path with better energy and quality, along with reduction in convergence time. 


2015 ◽  
Vol 713-715 ◽  
pp. 2269-2275
Author(s):  
Xiu Feng Qiu ◽  
Jian Wei Liu ◽  
Qian Hong Wu ◽  
Qi Zhong

Because of complicated security policy collisions and twisted interest conflicts in network domains, inter-domain routing security has been a challenge of secure routing. At present most of related researches focus on the authentication of routing source and true path, but seldom addresses another point of whether the routing decision process matches expected policy. In this paper, a multipath inter-domain routing decision verification protocol was designed, which can verify whether an autonomous domain (AD) keeps its promise about choosing appropriate M from N paths that have the same destination and are received from upstream ADs, and sending to a downstream AD. According to the analysis, the protocol is valid and can protect privacy of participants, as well as can resist attacks such as forgery, modification and replay etc. and deploy on internet incrementally.


2021 ◽  
Vol 10 (1) ◽  
pp. 8-11
Author(s):  
Michael Schapira

Combatting internet time shifters Arguably, the internet’s biggest security hole is the Border Gateway Protocol (BGP), which establishes routes between the organisational networks that make up the internet (e.g. Google, Facebook, Bank of England, Deutsche Telekom, AT&T). The insecurity of the internet’s routing system is constantly exploited to steal, monitor, and tamper with data traffic. Yet, despite many years of Herculean efforts, internet routing security remains a distant dream. The goal of the SIREN project is to propose and investigate novel paradigms for closing this security hole.


Sign in / Sign up

Export Citation Format

Share Document