The Trusted and Decentralized Network Resource Management

Network resource management relies on trusted infrastructures. However, current trusted infrastructures have centralized or hierarchical structures where root nodes often have privileges over subtrees. Hacked or malicious roots may affect subtrees by modifying IP ownership, routing and so on. Therefore, a trusted and decentralized network resource management becomes crucial. The emergence of blockchain such as Ethereum becomes a leading candidate for achieving trusted and decentralized network resource management. In this paper, based on Ethereum, we design a trusted authentication scheme that includes voting policy, endorsement, credibility model and rebinding mechanism to ensure the credibility of entities. Our scheme can allocate, delegate and transfer network resources in a trusted and decentralized style. The experimental results verify the feasibility and security of our scheme. When an entity is hacked or malicious, its endorsement authentication is revoked and the entity does not have the right to manage the network resources. In addition, the overhead increased by the trusted authentication scheme is within a reasonable range.

[1]  Aziz Mohaisen,et al.  RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[2]  T. V. Lakshman,et al.  The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet , 2016, HotNets.

[3]  Arne Meeuw,et al.  A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain , 2016, IOT.

[4]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[5]  Marcelo Bagnulo,et al.  An experiment in distributed Internet address management using blockchains , 2018, ArXiv.

[6]  Albert Cabellos-Aparicio,et al.  IPchain: Securing IP Prefix Allocation and Delegation with Blockchain , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[7]  Ethan Heilman,et al.  From the consent of the routed , 2014, SIGCOMM.

[8]  Baosheng Wang,et al.  BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution , 2018, Symmetry.

[9]  Ethan Heilman,et al.  On the risk of misbehaving RPKI authorities , 2013, HotNets.

[10]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[11]  Ali Aydın Selçuk,et al.  Public Key Infrastructure , 2011, Encyclopedia of Cryptography and Security.

[12]  Sajana P. TIFAC-CORE On Blockchain Applications : Hyperledger Fabric And Ethereum , 2018 .

[13]  T. Schmidt,et al.  Towards detecting BGP route hijacking using the RPKI , 2012, CCRV.