Visible to the public RouteChain: Towards Blockchain-Based Secure and Efficient BGP Routing

TitleRouteChain: Towards Blockchain-Based Secure and Efficient BGP Routing
Publication TypeConference Paper
Year of Publication2019
AuthorsSaad, Muhammad, Anwar, Afsah, Ahmad, Ashar, Alasmary, Hisham, Yuksel, Murat, Mohaisen, Aziz
Conference Name2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Date PublishedMay 2019
PublisherIEEE
ISBN Number978-1-7281-1328-9
Keywordsattack surface, autonomous systems, BGP, BGP hijacking, BGP prefix hijacking, bihierarchical blockchain model, blockchain, blockchain-based secure BGP routing system, composability, computer network security, Distributed databases, false prefixes, hijacking routing paths, Internet, Internet routing paths, malicious AS broadcasts IP prefixes, malicious entities, pubcrawl, Scalability, social networking (online), telecommunication network routing, Trust Routing, weak trust model, Youtube hijacking
Abstract

Routing on the Internet is defined among autonomous systems (ASes) based on a weak trust model where it is assumed that ASes are honest. While this trust model strengthens the connectivity among ASes, it results in an attack surface which is exploited by malicious entities to hijacking routing paths. One such attack is known as the BGP prefix hijacking, in which a malicious AS broadcasts IP prefixes that belong to a target AS, thereby hijacking its traffic. In this paper, we proposeRouteChain: a blockchain-based secure BGP routing system that counters BGP hijacking and maintains a consistent view of the Internet routing paths. Towards that, we leverage provenance assurance and tamper-proof properties of blockchains to augment trust among ASes. We group ASes based on their geographical (network) proximity and construct a bihierarchical blockchain model that detects false prefixes prior to their spread over the Internet. We validate strengths of our design by simulations and show its effectiveness by drawing a case study with the Youtube hijacking of 2008. Our proposed scheme is a standalone service that can be incrementally deployed without the need of a central authority.

URLhttps://ieeexplore.ieee.org/document/8751229
DOI10.1109/BLOC.2019.8751229
Citation Keysaad_routechain_2019