scholarly journals Reputation-Based Collaborative Management Method for Inter-Domain Routing Security

2010 ◽  
Vol 21 (3) ◽  
pp. 505-515 ◽  
Author(s):  
Ning HU ◽  
Peng ZOU ◽  
Pei-Dong ZHU
Author(s):  
Onur Hisarciklilar ◽  
Keyvan Rahmani ◽  
Vince Thomson

In complex products, maintaining subsystem consistency throughout the design process is often a time-consuming process of document exchange among cooperating functions. This paper describes a conflict management approach that lead to the computer-aided management of the product specification conflicts that happen due to the integration of subsystems. In order to define a framework, a systematic interface representation which proposes building generic interface schemes for subsystem connectivity representation is described. Based on this methodology, a functional architecture of the proposed conflict management method, along with generic exception taxonomy of conflicts is developed. The applicability of the proposed concepts is discussed through illustrative examples. The proposed methodology is intended to allow automatic detection and handling of interface connectivity errors throughout collaborative design processes.


2015 ◽  
Vol 713-715 ◽  
pp. 2269-2275
Author(s):  
Xiu Feng Qiu ◽  
Jian Wei Liu ◽  
Qian Hong Wu ◽  
Qi Zhong

Because of complicated security policy collisions and twisted interest conflicts in network domains, inter-domain routing security has been a challenge of secure routing. At present most of related researches focus on the authentication of routing source and true path, but seldom addresses another point of whether the routing decision process matches expected policy. In this paper, a multipath inter-domain routing decision verification protocol was designed, which can verify whether an autonomous domain (AD) keeps its promise about choosing appropriate M from N paths that have the same destination and are received from upstream ADs, and sending to a downstream AD. According to the analysis, the protocol is valid and can protect privacy of participants, as well as can resist attacks such as forgery, modification and replay etc. and deploy on internet incrementally.


2015 ◽  
Vol 12 (4) ◽  
pp. 1327-1344
Author(s):  
Lingjing Kong ◽  
Hong Shen

To resolve the difficulties in deployment of the classic security solution S-BGP (Secure Border Gateway Protocol), the Translator Trust Model (TTM) for a new solution SE-BGP (Security Enhanced BGP) was proposed to transform the centralized deployment mode of S-BGP to distributed mode. However, the trust (attestations of routing information) translation of TTM only depends on a single hub node and this results in severe threats for the inter-domain routing system. To overcome the deficiencies of TTM, in this paper we improve TTM to Distributed TTM (DTTM) by expanding the single hub node to a set of selected multiple hub nodes; in our DTTM, the task of attestations is distributed over multiple hub nodes instead of on a single hub node. In order to make the hub nodes respond to the case of single node failures, we design a restoration mechanism to recover the network based on the neighbour-ring structure. Besides, we develop Cooperative Secure BGP (CSBGP) to realize DTTM in BGP. In comparison with SE-BGP, our experimental results show that CS-BGP achieves an improved scalability, reduced convergence time and enhanced security.


2011 ◽  
Author(s):  
Shu Zhang ◽  
E. Tory Higgins ◽  
Guoquan Chen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document