Advertisement

Validating BGP Update Using Blockchain-Based Infrastructure

  • Kolade Folayemi Awe
  • Yasir Malik
  • Pavol Zavarsky
  • Fehmi JaafarEmail author
Chapter
  • 18 Downloads
Part of the Studies in Big Data book series (SBD, volume 71)

Abstract

A number of solutions have been proposed to secure the Border Gateway Routing (BGP) protocol by validating BGP update path and origin information. These solutions make use of centralized database, centralized Public Key Infrastructure (PKI) and some conventional PGP variants as their security mechanism. These solutions are prone to successful attack by state actors and often build database to verifying BGP updates without proper means of validating data stored in this database. Therefore, there is a need for alternative approach to secure the BGP routing protocol. In this chapter, we propose a blockchain based technology used to create a distributed or decentralized immutable database that relies on consensus of participating Autonomous System (AS), to build this blockchain. Every BGP route update received by an AS peer is validated against the content of the blockchain distributed database to detect updates with falsified path and origin information. The limitation of throughput and scalability associated with the blockchain would not affect the proposed blockchain solution once it is fully operational. This is because the data stored in the distributed ledger has a frequency or rate of change that is far lower than that of the blockchain transaction rate. Furthermore, with the blockchain solution, the centralized PKI root of trust is eliminated and AS are now capable of detecting and mitigating IP prefix hijack attack in real time, without outsourcing this service to a third party.

Keywords

The border gateway routing The public key infrastructure Blockchain based technology 

References

  1. 1.
    Rashevskiy, R.B., Shaburov, A.S.: BGP-hijacking attacks: theoretical basis and practical scenarios. In: IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 208–212 (2017)Google Scholar
  2. 2.
    Hari, A., Lakshman, T.V.: The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: ACM Workshop on Hot Topics in Networks, pp. 204–210 (2016)Google Scholar
  3. 3.
    de la Rocha, A., Arevalillo, G., Papadimitratos, P.: Blockchain-based public key infrastructure for inter-domain secure routing (2017)Google Scholar
  4. 4.
    Wang, N., Wang, B.: A secure inter-domain routing protocol. In: Second International Symposium on Intelligent Information Technology Application (2016)Google Scholar
  5. 5.
    Vidya, K., Rhymend Uthariaraj, V.: Application of logarithmic keying for securing ASPATH in inter-domain routing. In: 2009 First International Conference on Advanced Computing, pp. 86–92 (2009)Google Scholar
  6. 6.
    Butler, K., McDaniel, P., Aiello, W.: Optimizing BGP security by exploiting path security. In: ACM Conference on Computer and Communications Security, pp. 298–310 (2006)Google Scholar
  7. 7.
    Kent, S., Lynn, C., Seo, K.: Secure border gateway protocol (S-BGP). IEEE J. Sel. Areas Commun. 18, 582–592 (2000)CrossRefGoogle Scholar
  8. 8.
    Sermpezis, P., Kotronis, V., Gigis, P., Dimitropoulos, X., Cicalese, D., King, A., Dainotti, A.: ARTEMIS: neutralizing BGP hijacking within a minute. IEEE/ACM Trans. Netw. (TON) 2471–2486 (2018)Google Scholar
  9. 9.
    Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K.: Where is current research on blockchain technology? A systematic review (2016)Google Scholar
  10. 10.
    Kumari, S., Ruj, S.: SmartDNSPKI: A Blockchain Based DNS and PKI (2017)Google Scholar
  11. 11.
    Leo Arnason, S.: Cryptocurrency and bitcoin: a possible foundation of the future currency, why it has value, what is its history and its future outlook (2015)Google Scholar
  12. 12.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy., pp. 104–121 (2015)Google Scholar
  13. 13.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  14. 14.
    Giancaspro, M.: Is a smart contract really a smart idea? Insights from a legal perspective. Comput. Law Secu. Rev. 33(6), 825–835 (2017)CrossRefGoogle Scholar
  15. 15.
    Gervais, A., Karame, G.O., Wust, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. 3–16 (2016)Google Scholar
  16. 16.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Kolade Folayemi Awe
    • 1
  • Yasir Malik
    • 1
  • Pavol Zavarsky
    • 1
  • Fehmi Jaafar
    • 1
    • 2
    Email author
  1. 1.Concordia University EdmontonAlbertaCanada
  2. 2.The Computer Research InstituteQuebecCanada

Personalised recommendations