BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game
Abstract
:1. Introduction
2. Related Work
3. The BGP Neighbor Trust Mechanism Based on the Bargaining Game
3.1. Related Definitions
3.2. Bargaining Game Model
- Setup System Parameter. sets the service quality attribute vector range . sets the service quality attribute vector range . and are private information and will not be disclosed to the public.
- Quote. Within the number of quotations , given , and the current quotation number , / generates the th service quality attribute quotation vector , .
- Dicker Judgment. Within the number of quotations , given the service quality attribute quotation vector , / calculates the payoff . When is greater than or equal to the expected payoff, it outputs “True”. The negotiation is successful and the game ends. When is less than the expected payoff, it outputs “False”. The negotiation continues.
- If the and fail to reach an agreement within the deadline, the negotiation ends.
3.3. BNTE-BG Mechanism
- System Initialization. The BGP router sets the service quality attribute vector range and independently. represents the range of service quality attributes that the BGP router can accept. represents the minimum value of each service quality attribute that can be accepted. represents the maximum value of each service quality attribute that can be accepted. represents the range of service quality attributes that the BGP router can provide [23]. represents the minimum value of each service quality attribute that can be provided. } represents the maximum value of each service quality attribute that can be provided. The specific settings are as follows:
- 2.
- The BGP Neighbor Trust Establishment Process. We suppose that wants to establish a trusted neighbor relationship with its adjacent . is the neighbor trust establishment requester, with the service quality attribute vector range , the negotiation ability and the expected payoff . is the neighbor trust establishment agreer, with the service quality attribute vector range , the negotiation ability , and the expected payoff . The number of quotations for / is /. In order to better describe the process, we take . The implementation of BNTE-BG is shown in Figure 1 and Algorithm 1:
- Step 1:
- First, initiates a neighbor trust establishment request to . It uses the service quality attribute vector range , the current quotation number and the negotiation ability to generate the service quality attribute quotation vector through the quote strategy function . Then adds it to the TCP message and sends it to .
- Step 2:
- When receives the new TCP message from , it extracts the service quality attribute quotation vector . It calculates the payoff, then judges whether ’s satisfy the expected payoff . If it does, outputs “Establish neighbor”. If not, it uses the service quality attribute vector range , the current quotation number , and the negotiation ability to generate the service quality attribute quotation vector through the quote strategy function . Then adds it to the TCP message and sends to .
- Step 3:
- When receives the new TCP message from , it extracts the service quality attribute quotation vector . It calculates the payoff, then judges whether ’s satisfy the expected payoff . If it does, outputs “Establish neighbor”. If not, it outputs “Establish neighbor failed”.
- indicates that the BGP router sends its service quality attribute quotation vector to the adjacent BGP router.
- indicates that performs th quotation to generate the service quality attribute quotation vector .
- indicates that performs th quotation to generate the service quality attribute quotation vector .
- indicates that obtains the payoff accepting the service quality attribute quotation vector .
- indicates that AS2 obtains the payoff accepting the service quality attribute quotation vector.
- indicates that / determines whether to establish a neighbor relationship.
Algorithm 1: BNTE-BG establishment Input: , , , , , , , , , Output: Establish neighbor, Establish neighbor failed 1: , ;
2: if ()3: { 4: ; 5: ; 6: send () to ;
7: go 17;
8:
9: else
10: output Establish neighbor failed;
11: ;
12: ;
13: if (
14: output Establish neighbor
15: else
16: go 2;
17: ;
18: ;
19: if (
20: output Establish neighbor;
21: else if ()
22: {
23: ;
24: ;
25: send () to ;
26: go 11;
27: }
28: else
29: output Establish neighbor failed
3.4. Implementation of BNTE-BG Mechanism
- The quote strategy function is implemented as follows:
- The quote strategy function is implemented as follows:
- The payoff function and dicker judgment function are implemented as follows:
- The payoff function and dicker judgment function are implemented as follows:
4. The Detection Mechanism of the BGP Malicious/Inactive Neighbors
Detection Process
- Step 1:
- collects the data set of bandwidth, packet loss rate, jitter, and delay when forwards traffic times. The data set is marked as .
- Step 2:
- draw on the gray correlation algorithm to calculate the ’s behavioral trust . Since , , and are the cost attributes, to facilitate calculation, we use the worst packet loss rate R, the largest jitter J, and the longest delay D in the actual network to process data with the same attributes in the data set . The detection algorithm is Algorithm 2.
- Step 3:
- If behavioral trusts are all within the normal range, and continue to maintain the trusted neighbor relationship. If the behavioral trust appears abnormal, go to Step4.
- Step 4:
- sends a warning to and sets the number of forwarding . continues to calculate the ’s behavioral trusts when it forwards times.
- Step 5:
- If behavioral trusts are all within the normal range, and continue to maintain the trusted neighbor relationship. If still appears abnormal, judges as the malicious/inactive neighbor. Then, stops paying and filters the routing information announced/forwarded by .
Algorithm 2: Detection algorithm Input:, , R, J, D Output: 1: =; =R-;=J-;=D-;
2: for (i =1; i<=; i++)3: { 4: if ( 5: output = 1;
6: else
7: {
8: = R-;=J-;=D-;
9: for (j=1; j<=4; j++)
10: {
11: =
12: }
13: output =;
14: }
15: }
5. Simulation and Efficiency Analysis
5.1. Correctness
5.2. Storage Increment
5.3. Average Convergence Time
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Rekhter, Y.; Li, T.; Hares, S. A Border Gateway Protocol 4 (BGP-4). Network Working Group. 2006. Available online: https://www.rfc-editor.org/rfc/pdfrfc/rfc4271.txt.pdf (accessed on 10 May 2020).
- Murphy, S. BGP Security Vulnerabilities Analysis. Network Working Group. 2006. Available online: https://www.rfc-editor.org/rfc/pdfrfc/rfc4227.txt.pdf (accessed on 15 May 2020).
- White, R. Securing BGP through secure origin BGP (soBGP). Bus. Commun. Rev. 2003, 6, 15–22. [Google Scholar]
- Kent, S.; Lynn, C.; Seo, K. Secure border gateway protocol (S-BGP). IEEE J. Sel. Areas Commun. 2000, 18, 582–592. [Google Scholar] [CrossRef]
- Oorschot, P.C.; Wan, T.; Kranakis, E. On interdomain routing security and pretty secure BGP (psBGP). ACM TOPS 2007, 10. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Deng, W.; Liu, Z.; Huang, F. 3S: Three-signature path authentication for BGP security. Secur. Commun. Netw. 2015, 18, 3002–3014. [Google Scholar] [CrossRef]
- Xing, Q.; Wang, B.; Wang, X. Blockchain-based internet number resource authority and bgp security solution. Symmetry 2018, 10, 408. [Google Scholar] [CrossRef] [Green Version]
- Gao, L.; Rexford, J. Stable Internet routing without global coordination. IEEE-ACM Trans. Netw. 2001, 9, 681–692. [Google Scholar]
- Teixeira, R.; Shaikh, A.; Griffin, T.G.; Rexford, J. Impact of hot-potato routing changes in IP networks. IEEE-ACM Trans. Netw. 2008, 16, 1295–1307. [Google Scholar] [CrossRef] [Green Version]
- Resnick, P.; Zeckhauser, R.; Friedman, E.; Kuwabara, K. Reputation systems: Facilitating trust in Internet interactions. Commun. ACM 2000, 43, 45–48. [Google Scholar] [CrossRef]
- Yu, H.; Rexford, J.; Felten, E.W. A distributed reputation approach to cooperative internet routing protection. In Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec), Boston, MA, USA, 6 November 2005; pp. 73–78. [Google Scholar]
- Konte, M.; Perdisci, R.; Feamster, N. Aswatch: An as reputation system to expose bulletproof hosting ases. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, London, UK, 17–21 August 2015; Association for Computing Machinery: New York, NY, USA, 2015. [Google Scholar]
- Siganos, G.; Faloutsos, M. Neighborhood watch for internet routing: Can we improve the robustness of internet routing today? In Proceedings of the IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Barcelona, Spain, 6–12 May 2007. [Google Scholar]
- Chang, J.; Venkatasubramanian, K.K.; West, A.G.; Kannan, S.; Loo, B.T.; Sokolsky, O.; Lee, I. AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP. International Conference on Trust and Trustworthy Computing; Springer: Berlin/Heidelberg, Germany, 2011; pp. 262–276. [Google Scholar]
- Wang, Y.; Schapira, M.; Rexford, J. Neighbor-specific BGP: More flexible routing policies while improving global stability. In Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, Seattle, WA, USA, 15–19 June 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 217–228. [Google Scholar]
- Rubinstein, A. Perfect equilibrium in a bargaining model. Econometrica 1982, 50, 97–109. [Google Scholar] [CrossRef] [Green Version]
- Njilla, L.Y.; Pissinou, N. Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. In Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Verona, NY, USA, 26–28 May 2015; pp. 1–6. [Google Scholar]
- Liu, C.; Li, K.; Tang, Z. Bargaining game-based scheduling for performance guarantees in cloud computing. ACM TOMPECS 2018, 3, 1–25. [Google Scholar] [CrossRef]
- Li, P.; Han, B.; Li, H.; Hou, D.; Liu, D.; Wang, G. The Research of Dynamic Spectrum Allocation Based on Nash Bargaining Game. In Proceedings of the 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 26–28 May 2018; pp. 70–74. [Google Scholar]
- Sun, G.; Guan, X.; Yi, X.; Zhou, Z. Gray relational analysis between hesitant fuzzy sets with applications to pattern recognition. Expert Syst. Appl. 2018, 92, 521–532. [Google Scholar] [CrossRef]
- Lad, M.; Massey, D.; Pei, D.; Wu, Y.; Zhang, B.; Zhang, L. PHAS: A Prefix Hijack Alert System. In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 31 July–4 August 2006. [Google Scholar]
- Zhang, Z.; Zhang, Y.; Hu, Y.C. iSPY: Detecting IP prefix hijacking on my own. IEEE-ACM Trans. Netw. 2010, 18, 1815–1828. [Google Scholar] [CrossRef] [Green Version]
- Li, J.; Luo, H.; Zhang, S.; Li, H.; Yan, F. Design and implementation of efficient control for incoming inter-domain traffic with information-centric networking. J. Netw. Comput. Appl. 2019, 133, 109–125. [Google Scholar] [CrossRef]
- The CAIDA Internet Topology Data Kit. 2019.01. Available online: https://www.caida.org/data/internet-topology-data-kit (accessed on 3 March 2021).
Serial Number | Bandwidth/G | Packet Loss Rate | Jitter/ms | Delay/ms |
---|---|---|---|---|
1 | 50 | 0 | 10 | 40 |
2 | 52 | 0.05 | 13 | 45 |
3 | 53 | 0.2 | 25 | 70 |
4 | 40 | 0.1 | 16 | 50 |
5 | 45 | 0.5 | 113 | 172 |
6 | 7 | 0.7 | 148 | 230 |
7 | 5 | 0.9 | 156 | 389 |
Storage Overhead Per Router/Byte | Packet Length Increment/Byte | |
---|---|---|
BNTE-BG | 20 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, P.; Lu, B.; Li, D. BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game. Information 2021, 12, 110. https://doi.org/10.3390/info12030110
Li P, Lu B, Li D. BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game. Information. 2021; 12(3):110. https://doi.org/10.3390/info12030110
Chicago/Turabian StyleLi, Peipei, Bin Lu, and Daofeng Li. 2021. "BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game" Information 12, no. 3: 110. https://doi.org/10.3390/info12030110
APA StyleLi, P., Lu, B., & Li, D. (2021). BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game. Information, 12(3), 110. https://doi.org/10.3390/info12030110