Fast ReRoute Technique in BGP with Secure Route Reliability Testing Algorithm


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


This paper deals with the Fast Reroute technique which is the extension of the Route Reliability Testing (RRT) algorithm. The main issues of the BGP are link failure and untrustworthiness of the link and many more. In a network when the actual link fails the data will not be sent to its destination and which results in congestion and also increases the load of the network. To deal with these issues, in this paper we propose a Fast ReRoute (FRR) Technique in BGP, which helps when the primary link fails by finding an alternate link for the data. The main advantage of this of this proposal is while finding the alternate link the lowest post failure, traffic load across all the links into the account and also it is possible to decrease the data packet loss.  By simulation results, we show that the proposed rerouting technique reduces the packet loss and increases the throughput
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Route Reliability Testing (RRT); Border Gateway Protocol (BGP); Fast ReRoute (FRR) Technique

Full Text:

PDF


References


K. Butler, T. Farley, P. McDaniel, and J. Rexford, "A survey of BGP security", Technical Report TD-5UGJ33, AT&T Labs, June 2004.

Geoff Huston, Mattia Rossi, Grenville Armitage, “Securing BGP - A Literature Survey”, IEEE Communications Surveys and Tutorials, vol. 13, NO. 2, second quarter 2011.

Kevin Butler, Toni R. Farle, Patrick McDaniel and Jennifer Rexford “A Survey of BGP Security Issues and Solutions” Proceedings of the IEEE Vol. 98, No. 1, January 2010.

Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo, "Secure Border Gateway Protocol (S-BGP) — Real World Performance and Deployment Issues", IEEE Journal on Selected Areas in Communications, February 2000.

Russ White,” Securing BGP through Secure Origin BGP (soBGP)", Business Communications Review Article, May 1, 2003.

Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel and Aviel Rubin, "Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing”, in proc. of NDSS, San Diego, CA, USA, Feb. 2003.

T. Wan, E. Kranakis, and P. van Oorschot, “Pretty secure BGP (psBGP),”in Proc. Of Network and Distributed System Security, 2005.

Yih-Chun Hu, Adrian Perrig and Marvin Sirbu, "SPV: Secure Path Vector Routing for Securing BGP", ACM SIGCOMM Computer Communication Review, vol. 34, no.4, pp: 179 - 192, October 2004.

Meiyuan Zhao, Sean W. Smith, David M. Nicol, “Aggregated Path Authentication for Efficient BGP Security”, 12th ACM Conference on Computer and Communications Security, Nov. 2005.

Martin Suchara, Lannis Avramopoulos, Jennifer Rexford, “Securing BGP Incrementally”, Association of Computing Machinery, 2007.

Pekka Rantala, Seppo Virtanen and Jouni Isoaho, “Hybrid Trust Model for Internet Routing”, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.3, May 2011

Hiroshi Fujinoki, “Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing”, Availability, Reliability and Security. ARES '09. International Conference, 248 - 256, 16-19 March 2009

Ning Wang, Yu Guo, Kin-Hon Ho, Michael Howarth, George Pavlou, “Fast Network Failure Recovery Using Multiple BGP Routing Planes”, Global Telecommunications Conference. GLOBECOM 2009. IEEE, 1-6, Nov. 30 2009-Dec. 4 2009

He Yan, Ricardo Oliveira, Kevin Burnett, Dave Matthews, Lixia Zhang and Dan Massey, “BGPmon: A real-time, scalable, extensible monitoring system”, Conference for Homeland Security, CATCH '09. Cybersecurity Applications & Technology, 212- 223, 3-4 March 2009

Fernando Sanchez and Zhenhai Duan, “Region-based BGP Announcement Filtering for Improved BGP Security”, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Pages 89-100, 2010

Liu, Y., Su, J., Leveraging data-plane information to detect BGP prefix hijacking attacks, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2088-2094.

Network Simulator, http://www.isi.edu/nsnam/ns

http://www.ensc.sfu.ca/~ljilja/cnl/projects/BGP-ns-2.33/ns-bgp.html


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize