Routing Security Using Blockchain Technology

M Gómez, P Bazán, N Río, M Morandi - … on Cloud Computing, Big Data & …, 2021 - Springer
M Gómez, P Bazán, N Río, M Morandi
Conference on Cloud Computing, Big Data & Emerging Topics, 2021Springer
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than
any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol
itself, and today these failures continue to occur and research continues on what is the best
strategy to provide security for routing on the Internet. New solutions, such as RPKI, are
generating risks due to the centralization of the routing authority, they are not based on
mutual trust, but depend on trust in the authority. This work seeks to implement a less …
Abstract
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol itself, and today these failures continue to occur and research continues on what is the best strategy to provide security for routing on the Internet. New solutions, such as RPKI, are generating risks due to the centralization of the routing authority, they are not based on mutual trust, but depend on trust in the authority. This work seeks to implement a less centralized model, based on blockchain technology, where security is provided to the BGP protocol through the deployment of a specific application for the allocation of Internet resources in the Ethereum Ropsten network, and the subsequent use of this stored information.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果