Netinfo Security ›› 2015, Vol. 15 ›› Issue (1): 24-31.doi: 10.3969/j.issn.1671-1122.2015.01.005

Previous Articles     Next Articles

ZHAO Yu-dong(), XU Ke, ZHU Liang   

  1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
  • Received:2014-11-14 Online:2015-01-10 Published:2015-07-05

Abstract:

Influenced by subjective will and development capability, manufacturers can hardly keep their promise to provide users the expected routers. Therefore there might be bugs and backdoor hidden inside routers or components. This may seriously threat security in core network. This paper presents a method to define and dynamically quantize the trustworthy attribute of router service, designs the trustworthy routing protocols, in order to optimize the trustworthy attribute of core network service. This paper first analyses the relationship between trustworthy attribute and communication security of core network , demonstrates that a core network can maximize its ability of secure communication by quantizing its routers’ trustworthy attributes, together with designing trustworthy routing protocols. Secondly, this paper uses the word of ‘trustworthy-degree’ to define the trustworthy attributes of routers, by designing intra-domain and inter-domain trustworthy routing protocols based on the trustworthy-degrees of the routers and the routing protocols of the Internet in use , proves theoretically the existence of the optimal trustworthy routing. Then this paper proposes the dynamic quantization technique of the routers’ trustworthy-degrees by detecting the uniformity between the trustworthy routing roads and the actual forward roads of packets. Finally, this paper builds a network model of trustworthy routing to detect the security benefit of trustworthy routing protocols and the impact to the traditional routing costs. The result shows that the trustworthy routing can distinctly improve the communication security of core networks, and the increasement of traditional routing costs and the frequency and the range of routing change are tolerable.

Key words: trustworthy attribute of service, core network, information security, trustworthy routing-degree

CLC Number: