[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

RETRACTED ARTICLE: Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

This article was retracted on 21 October 2024

This article has been updated

Abstract

Heterogeneous wireless networks play an important role in next-generation worldwide internet with seamless connectivity. Mobile network operators continue to grow their subscriber bases and move further toward being internet service providers, instead of basic voice and data service providers. The next-generation wireless technology is intended to support high-quality broadband performance and multimedia applications without any disturbance. In connection with that, the inter-domain routing is taking a significant role in heterogeneous wireless networks. Border Gateway Routing Protocol (BGP) is an inter-domain routing protocol. The performance of BGP is degraded by three vulnerabilities such as physical attacks on infrastructure, attacks on data and control messages by third party. The proposed work mainly focuses on the third category that attacks on control messages, by injecting false control messages into BGP routing information which creates false origin AS and tampered AS path. BGP Internet protocol (IP) prefix attack is the major threat to internet-based information routing systems. The consequences of this attack can damage IP address-based systems and cause routing instability on the internet. So each BGP speaker (router) and autonomous system in the BGP routing process must need to verify and validate the authentication before initiating the network communication. With respect to this problem, a large amount of BGP security-related researches are revealed. Till now, BGP security aspects remain vulnerable and their security algorithms have maximum computation cost and communication cost and create more memory overhead. A new quantum key distribution algorithm incorporated with inter-domain routing protocol BGP in the proposed work is named Quantum Security Enhanced-BGP (QSE-BGP). The proposed QSE-BGP scheme provides secure secret sharing and mutual authentication process in BGP routing for less computation cost, authentication delay and reduced memory overhead. The overall QSE-BGP performance is increased as or into 50% than existing work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Change history

Notes

  1. https://arstechnica.com/security/2017/04/russian-controlled-telecom-hijacks-financial-services-internet-traffic/.

  2. Route Views Project. http://www.routeviews.org/.

References

  • Aggarwal R, Sharma H, Gupta D (2011) Analysis of various attacks over BB84 quantum key distribution protocol. Int J Comput Appl 20(8):28–31

    Google Scholar 

  • Bellovin S, Bush R, Griffin T, Rexford J (2001) Slowing routing table growth by filtering based on address allocation policies

  • Bruhadeshwar B, Kulkarni SS, Liu AX (2008) Symmetric key approaches to securing BGP a little bit trust is enough. In: ESORICS. Springer, pp 82–96

  • Chang G, Arianezhad M, Trajkovic L (2015) Using resource public key infrastructure secure border gateway protocol. In: IEEE Canadian conference on electrical and computer engineering (CCECE)

  • Cheung S (1997) An efficient message authentication scheme for link state routing. In: 13th Annual computer security applications conference, San Diego, CA, December 1997, pp 90–98

  • Dǔsek M, Haderka O, Hendrych M et al (1999) Quantum identification system. Phys Rev A 60:149–156

    Article  Google Scholar 

  • Frey S, Elkhatib Y, Rashid A, Follis K, Vidler J, Race N, Edwards C (2016) It bends but would it break? Topological analysis of BGP infrastructures in Europe. In: European symposium on security and privacy (EuroS&P). IEEE, Saarbrucken, Germany, pp 423–438

  • Godhavari T, Alamelu NR (2013) Quantum encoder and decoder for secret key distribution with check bits. Res J Appl Sci Eng Technol 6(23):4381–4386

    Article  Google Scholar 

  • Goldberg S, Halevi S, Jaggard AD, Ramachandran V, Wright RN (2008) Rationality and traffic attraction: incentives for honest path announcements in BGP. In: SIGCOMM conference on data communication, ACM, Seattle, WA, USA, pp 267–278

  • Goodell G, Aiello W, Griffin T, Ioannidis J, McDaniel P, Rubin A (2003) Working around BGP: an incremental approach to improving security and accuracy of interdomain routing. In: Proceedings of network and distributed systems security 2003, Internet Society, San Diego, CA (Draft)

  • Hiran R, Carlsson N, Shahmehri N (2017) Collaborative framework for protection against attacks targeting BGP and edge networks. Comput Netw 122:120–137

    Article  Google Scholar 

  • Hu Y-C, Perrig A, Sirbu MA (2004) SPV: secure path vector routing for securing BGP. In: SIGCOMM, ACM, pp 179–192

  • Kent S, Atkinson R (1998) Security architecture for the Internet Protocol. RFC 2401

  • Kent S, Lynn C, Seo K (2000) Secure border gateway protocol (S-BGP). IEEE J Sel Areas Commun 18:582–592

    Article  Google Scholar 

  • Kruegel C, Mutz D, Robertson W, Valeur F (2003) Topology-based detection of anomalous BGP messages. In: Proceedings of the 6th symposium on recent advances in intrusion detection (RAID), pp 17–35

  • Ljunggren D, Bourennane M, Karlsson A (2000) Authority-based user authentication in quantum key distribution. Phys Rev A 62:022305-1–022305-7

    Article  Google Scholar 

  • Nguyen TMT, Sfaxi MA, Ghernaouti-Hlie S (2006) 802.11i encryption key distribution using quantum cryptography. J Netw 1(5):9–20

    Google Scholar 

  • Nicol DM, Smith SW, Zhao M (2004) Evaluation of efficient security for BGP route announcements using parallel simulation. Simul Model Pract Theory 12:187–216

    Article  Google Scholar 

  • Nordström O, Dovrolis C (2004) Beware of BGP attacks. Comput Commun Rev 34(2):1–8

    Article  Google Scholar 

  • Pei D, Massey D, Zhang L (2003) A framework for resilient Internet routing protocols. Technical Report, UCLA

  • Pei D, Aiello W, Gilbert A, McDaniel P (2004) Origin disturbances in BGP

  • Perlman R (1988) Network layer protocols with Byzantine robustness. Technical Report MIT/LCS/TR-429

  • Raimagia D, Singh S, Zafar S (2013) A novel approach for secure routing through BGP using symmetric key. Int J Netw Sec Appl (IJNSA) 5(5):153

    Google Scholar 

  • Rass S, Konig S (2012) Turning quantum cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1):25–39

    Google Scholar 

  • Rekhter Y (1991) Experience with the BGP Protocol. RFC 1266 (Informational), Internet Engineering Task Force

  • Rekhter Y, Li T (1995) A Border Gateway Protocol 4 (BGP 4). IETF RFC 1771

  • Seo K, Lynn C, Kent S (2001) Public-key Infrastructure for the Secure Border Gateway Protocol (S-BGP). In: Proceedings of DARPA information survivability conference and exposition II, IEEE

  • Siddiqui MS, Montero D, Serral-Gracià R, Yannuzzi M (2015) Self-reliant detection of route leaks in inter-domain routing. Comput Netw 82:135–155

    Article  Google Scholar 

  • Smith B, Garcia-Luna-Aceves J (1996) Securing the border gateway routing protocol. In: Proceedings of Global Internet’96, November 1996, pp 103–116

  • Van Oorschot PC, Wan T, Kranakis E (2007) On inter-domain routing security and pretty secureBGP (psBGP). ACM Trans Inf Syst Sec 10:1–41

    Google Scholar 

  • White R (2003) Securing BGP through secure origin BGP. Internet Protocol J 6:15–22

    Google Scholar 

  • Zeng GH, Zhang WP (2001) Identity verification in quantum key distribution. Phys Rev A 61:022303-1-5

    Google Scholar 

  • Zhao X, Pei D, Wang L, Massey D, Mankin A, Wu SF, Zhang L (2001) An analysis of BGP multiple origin AS (MOAS) conflicts. In: ACM SIGCOMM internet measurement workshop 2001, ACM

  • Zhu P, Cao H, Yang LT, Chen K (2012) AS alliance based security enhancement for inter-domain routing protocol. Int J Math Comput Model 55:241–255

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Elamathi.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by P. Pandian.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s00500-024-10215-1

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elamathi, N., Jayashri, S. & Pitchai, R. RETRACTED ARTICLE: Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques. Soft Comput 23, 2735–2746 (2019). https://doi.org/10.1007/s00500-019-03836-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-03836-4

Keywords

Navigation