Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

20-02-2019 | Focus | Issue 8/2019

Soft Computing 8/2019

Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques

Journal:
Soft Computing > Issue 8/2019
Authors:
N. Elamathi, S. Jayashri, R. Pitchai
Important notes
Communicated by P. Pandian.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Abstract

Heterogeneous wireless networks play an important role in next-generation worldwide internet with seamless connectivity. Mobile network operators continue to grow their subscriber bases and move further toward being internet service providers, instead of basic voice and data service providers. The next-generation wireless technology is intended to support high-quality broadband performance and multimedia applications without any disturbance. In connection with that, the inter-domain routing is taking a significant role in heterogeneous wireless networks. Border Gateway Routing Protocol (BGP) is an inter-domain routing protocol. The performance of BGP is degraded by three vulnerabilities such as physical attacks on infrastructure, attacks on data and control messages by third party. The proposed work mainly focuses on the third category that attacks on control messages, by injecting false control messages into BGP routing information which creates false origin AS and tampered AS path. BGP Internet protocol (IP) prefix attack is the major threat to internet-based information routing systems. The consequences of this attack can damage IP address-based systems and cause routing instability on the internet. So each BGP speaker (router) and autonomous system in the BGP routing process must need to verify and validate the authentication before initiating the network communication. With respect to this problem, a large amount of BGP security-related researches are revealed. Till now, BGP security aspects remain vulnerable and their security algorithms have maximum computation cost and communication cost and create more memory overhead. A new quantum key distribution algorithm incorporated with inter-domain routing protocol BGP in the proposed work is named Quantum Security Enhanced-BGP (QSE-BGP). The proposed QSE-BGP scheme provides secure secret sharing and mutual authentication process in BGP routing for less computation cost, authentication delay and reduced memory overhead. The overall QSE-BGP performance is increased as or into 50% than existing work.

Please log in to get access to this content

To get access to this content you need the following product:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 30 Tage kostenlos.

Literature
About this article

Other articles of this Issue 8/2019

Soft Computing 8/2019 Go to the issue

Premium Partner

    Image Credits