Research on Blockchain-based Interdomain Security Solutions

被引:0
|
作者
Chen D. [1 ,2 ,3 ]
Qiu H. [1 ,2 ]
Zhu J.-H. [1 ,2 ]
Wang Q.-X. [1 ,2 ]
机构
[1] PLA Strategic Support Force, Information Engineering University, Zhengzhou
[2] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou
[3] Luoyang Electronic Equipment Test Center of China, Luoyang
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 01期
基金
中国国家自然科学基金;
关键词
Blockchain; Interdomain routing security; Internet number resource certification; Route origin attestation;
D O I
10.13328/j.cnki.jos.005867
中图分类号
学科分类号
摘要
Much attention has been paid to the security of interdomain routing system. It is crucial to achieve the origin validation of Internet resource and multi-domain collaboration. By virtue of the natural attributes of blockchain including decentralization, tamper- resistant, and traceability, blockchain technology can act as the basis of Internet resource certification and trust establishment among multiple Internet domains. Firstly, the vulnerabilities of interdomain routing system and the dilemma of existing interdomain security proposals are analyzed including difficulty in deployment, complexity in management, centralized trust mechanism, etc. Secondly, based on the introduction of the basic concept of blockchain, the technical ideals of blockchain-based interdomain security solutions are pointed out, and an up-to-date review of blockchain-based interdomain security solutions is conducted from 3 aspects: interdomain routing authentication, intelligent interdomain management, and DDoS defense and mitigation. Finally, the advantages of blockchain-based interdomain security solutions are summarized and corresponding challenges are analyzed from the perspectives of scalability, deployment, and security, and the development outlook of blockchain technology used in the field of interdomain routing security is highlighted. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:208 / 227
页数:19
相关论文
共 67 条
  • [1] Rekhter Y., Li T., Hares S., A border gateway protocol 4 (BGP-4), (2006)
  • [2] Nordstrom O., Dovrolis C., Beware of BGP attacks, ACM SIGCOMM Computer Communication Review, 34, 2, pp. 1-8, (2004)
  • [3] Ratul M., Wetherall D., Anderson T., Understanding BGP misconfiguration, ACM SIGCOMM Computer Communication Review, 32, 4, (2002)
  • [4] Li S., Zhuge J.W., Li X., Study on BGP security, Ruan Jian Xue Bao/Joumal of Software, 24, 1, pp. 121-138, (2013)
  • [5] Giotsas V., Luckie M., Huffaker B., Inferring complex as relationships, Proc. of the 2014 Conf. on Internet Measurement Conf., pp. 23-30, (2014)
  • [6] Kent S., Lynn C., Seo K., Secure border gateway protocol, IEEE Journal on Selected Areas in Communications, 18, 4, pp. 582-592, (2002)
  • [7] White R., Securing BGP through secure origin BGP (soBGP), Business Communications Review, 33, 5, (2003)
  • [8] Lepinski M., Kent S., An infrastructure to support secure internet routing, (2012)
  • [9] Lepinski M., Kent S., Kong D., A profile for route origin authorizations (ROAs), (2012)
  • [10] Lepinski M., Sriram K., BGPSEC protocol specification, (2017)