Abstract
Heterogeneous wireless networks play an important role in next-generation worldwide internet with seamless connectivity. Mobile network operators continue to grow their subscriber bases and move further toward being internet service providers, instead of basic voice and data service providers. The next-generation wireless technology is intended to support high-quality broadband performance and multimedia applications without any disturbance. In connection with that, the inter-domain routing is taking a significant role in heterogeneous wireless networks. Border Gateway Routing Protocol (BGP) is an inter-domain routing protocol. The performance of BGP is degraded by three vulnerabilities such as physical attacks on infrastructure, attacks on data and control messages by third party. The proposed work mainly focuses on the third category that attacks on control messages, by injecting false control messages into BGP routing information which creates false origin AS and tampered AS path. BGP Internet protocol (IP) prefix attack is the major threat to internet-based information routing systems. The consequences of this attack can damage IP address-based systems and cause routing instability on the internet. So each BGP speaker (router) and autonomous system in the BGP routing process must need to verify and validate the authentication before initiating the network communication. With respect to this problem, a large amount of BGP security-related researches are revealed. Till now, BGP security aspects remain vulnerable and their security algorithms have maximum computation cost and communication cost and create more memory overhead. A new quantum key distribution algorithm incorporated with inter-domain routing protocol BGP in the proposed work is named Quantum Security Enhanced-BGP (QSE-BGP). The proposed QSE-BGP scheme provides secure secret sharing and mutual authentication process in BGP routing for less computation cost, authentication delay and reduced memory overhead. The overall QSE-BGP performance is increased as or into 50% than existing work.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Change history
21 October 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00500-024-10215-1
References
Aggarwal R, Sharma H, Gupta D (2011) Analysis of various attacks over BB84 quantum key distribution protocol. Int J Comput Appl 20(8):28–31
Bellovin S, Bush R, Griffin T, Rexford J (2001) Slowing routing table growth by filtering based on address allocation policies
Bruhadeshwar B, Kulkarni SS, Liu AX (2008) Symmetric key approaches to securing BGP a little bit trust is enough. In: ESORICS. Springer, pp 82–96
Chang G, Arianezhad M, Trajkovic L (2015) Using resource public key infrastructure secure border gateway protocol. In: IEEE Canadian conference on electrical and computer engineering (CCECE)
Cheung S (1997) An efficient message authentication scheme for link state routing. In: 13th Annual computer security applications conference, San Diego, CA, December 1997, pp 90–98
Dǔsek M, Haderka O, Hendrych M et al (1999) Quantum identification system. Phys Rev A 60:149–156
Frey S, Elkhatib Y, Rashid A, Follis K, Vidler J, Race N, Edwards C (2016) It bends but would it break? Topological analysis of BGP infrastructures in Europe. In: European symposium on security and privacy (EuroS&P). IEEE, Saarbrucken, Germany, pp 423–438
Godhavari T, Alamelu NR (2013) Quantum encoder and decoder for secret key distribution with check bits. Res J Appl Sci Eng Technol 6(23):4381–4386
Goldberg S, Halevi S, Jaggard AD, Ramachandran V, Wright RN (2008) Rationality and traffic attraction: incentives for honest path announcements in BGP. In: SIGCOMM conference on data communication, ACM, Seattle, WA, USA, pp 267–278
Goodell G, Aiello W, Griffin T, Ioannidis J, McDaniel P, Rubin A (2003) Working around BGP: an incremental approach to improving security and accuracy of interdomain routing. In: Proceedings of network and distributed systems security 2003, Internet Society, San Diego, CA (Draft)
Hiran R, Carlsson N, Shahmehri N (2017) Collaborative framework for protection against attacks targeting BGP and edge networks. Comput Netw 122:120–137
Hu Y-C, Perrig A, Sirbu MA (2004) SPV: secure path vector routing for securing BGP. In: SIGCOMM, ACM, pp 179–192
Kent S, Atkinson R (1998) Security architecture for the Internet Protocol. RFC 2401
Kent S, Lynn C, Seo K (2000) Secure border gateway protocol (S-BGP). IEEE J Sel Areas Commun 18:582–592
Kruegel C, Mutz D, Robertson W, Valeur F (2003) Topology-based detection of anomalous BGP messages. In: Proceedings of the 6th symposium on recent advances in intrusion detection (RAID), pp 17–35
Ljunggren D, Bourennane M, Karlsson A (2000) Authority-based user authentication in quantum key distribution. Phys Rev A 62:022305-1–022305-7
Nguyen TMT, Sfaxi MA, Ghernaouti-Hlie S (2006) 802.11i encryption key distribution using quantum cryptography. J Netw 1(5):9–20
Nicol DM, Smith SW, Zhao M (2004) Evaluation of efficient security for BGP route announcements using parallel simulation. Simul Model Pract Theory 12:187–216
Nordström O, Dovrolis C (2004) Beware of BGP attacks. Comput Commun Rev 34(2):1–8
Pei D, Massey D, Zhang L (2003) A framework for resilient Internet routing protocols. Technical Report, UCLA
Pei D, Aiello W, Gilbert A, McDaniel P (2004) Origin disturbances in BGP
Perlman R (1988) Network layer protocols with Byzantine robustness. Technical Report MIT/LCS/TR-429
Raimagia D, Singh S, Zafar S (2013) A novel approach for secure routing through BGP using symmetric key. Int J Netw Sec Appl (IJNSA) 5(5):153
Rass S, Konig S (2012) Turning quantum cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1):25–39
Rekhter Y (1991) Experience with the BGP Protocol. RFC 1266 (Informational), Internet Engineering Task Force
Rekhter Y, Li T (1995) A Border Gateway Protocol 4 (BGP 4). IETF RFC 1771
Seo K, Lynn C, Kent S (2001) Public-key Infrastructure for the Secure Border Gateway Protocol (S-BGP). In: Proceedings of DARPA information survivability conference and exposition II, IEEE
Siddiqui MS, Montero D, Serral-Gracià R, Yannuzzi M (2015) Self-reliant detection of route leaks in inter-domain routing. Comput Netw 82:135–155
Smith B, Garcia-Luna-Aceves J (1996) Securing the border gateway routing protocol. In: Proceedings of Global Internet’96, November 1996, pp 103–116
Van Oorschot PC, Wan T, Kranakis E (2007) On inter-domain routing security and pretty secureBGP (psBGP). ACM Trans Inf Syst Sec 10:1–41
White R (2003) Securing BGP through secure origin BGP. Internet Protocol J 6:15–22
Zeng GH, Zhang WP (2001) Identity verification in quantum key distribution. Phys Rev A 61:022303-1-5
Zhao X, Pei D, Wang L, Massey D, Mankin A, Wu SF, Zhang L (2001) An analysis of BGP multiple origin AS (MOAS) conflicts. In: ACM SIGCOMM internet measurement workshop 2001, ACM
Zhu P, Cao H, Yang LT, Chen K (2012) AS alliance based security enhancement for inter-domain routing protocol. Int J Math Comput Model 55:241–255
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by P. Pandian.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s00500-024-10215-1
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Elamathi, N., Jayashri, S. & Pitchai, R. RETRACTED ARTICLE: Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques. Soft Comput 23, 2735–2746 (2019). https://doi.org/10.1007/s00500-019-03836-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-019-03836-4