Test: Securing Routing Protocols

1842 days ago, 522 views
PowerPoint PPT Presentation

Presentation Transcript

Slide 1

´╗┐Challenge: Securing Routing Protocols Adrian Perrig perrig@cmu.edu

Slide 2

Why Secure Routing? Conveyed steering conventions accept a trusted situation! Indeed, even misconfigurations can seriously disturb steering conventions Secure directing properties Reduce misconfiguration affect Robust against traded off hubs (Byzantine disappointments) Only honest to goodness hubs take an interest in sending Prevent aggressors from infusing sham courses

Slide 3

Secure Routing Illustration C J G An A D S E I B H F

Slide 4

Secure Ad Hoc Network Routing Protocols SEAD: Secure Efficient Ad hoc Distance vector directing convention [WMCSA 2002] Ariadne: secure on-request directing convention [Mobicom 2002] New steering assaults Wormhole assault [Infocom 2003] Rushing assault Joint work with Yih-Chun Hu and David Johnson

Slide 5

Secure Sensor Network Routing Challenges Energy requirements welcome DoS assaults Memory and transfer speed imperatives forestall utilizing advanced directing conventions Compromised hubs may infuse pernicious messages or drop information movement Current approach: consolidate probabilistic directing with multi-way directing

Slide 6

Secure Internet Routing Challenges Legacy frameworks Untrusted spaces, convoluted trust connections Even misconfigurations can altogether irritate Internet steering Current venture: utilize productive cryptographic systems to confirm BGP directing redesigns

Slide 7

Research Directions Today we specify assaults and ensure against them To begin securing BGP, RPsec IETF working gathering is building up a rundown of BGP vulnerabilities We have to set up measurements Allows examination of conventions Study security properties versus execution Measure viability of DoS assaults E.g., in sensor systems: assailant vitality/organize vitality