Negotiating a New Governance Hierarchy: An Analysis of the Conflicting Incentives to Secure Internet Routing

New security technologies are never neutral in their impact; it is known that they can alter power relations and economic dependencies among stakeholders. This article examines the attempt to introduce the Resource Public Key Infrastructure (RPKI) to the Internet to help improve routing security, and identifies incentives various actors have towards RPKI implementation. We argue that RPKI requires ISPs to achieve security at the expense of autonomy, requires all actors to tradeoff simplified global compatability and centralization of power, and affects the policies and business models of the Regional Internet Registries and their relationship to the Internet Corporation for Assigned Names and Numbers. While the Internet remains a space where authority is highly distributed, elements of hierarchy do exist, especially around critical resource allocation, and it is likely that security and other concerns will lead to continuing efforts to leverage those hierarchies into more powerful governance arrangements.

[1]  Nicholas Economides,et al.  Networks and compatibility: Implications for antitrust , 1994 .

[2]  N. Economides The Economics of Networks , 1995 .

[3]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[4]  Milton L. Mueller,et al.  Universal Service: COMPETITION, INTERCONNECTION, AND MONOPOLY IN THE MAKING OF THE AMERICAN TELEPHONE SYSTEM , 1996 .

[5]  W. J. Drake Reforming Internet Governance: Perspectives from the Working Group on Internet Governance , 2005 .

[6]  Susan Hares,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[7]  Antonio Lioy,et al.  Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings , 2006, EuroPKI.

[8]  Malte Ziewitz,et al.  Jefferson Rebuffed - the United States and the Future of Internet Governance , 2006 .

[9]  Antonio Lioy,et al.  Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings (Lecture Notes in Computer Science) , 2006 .

[10]  Brian Weis,et al.  (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP , 2006, HotNets.

[11]  Yi Yang,et al.  Generic Threats to Routing Protocols , 2006, RFC.

[12]  Stephen T. Kent,et al.  An Infrastructure Supporting Secure Internet Routing , 2006, EuroPKI.

[13]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[14]  Marc Lelarge,et al.  Economics of malware: Epidemic risks model, network externalities and incentives , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[15]  Johannes M. Bauer,et al.  Cybersecurity: Stakeholder incentives, externalities, and policy options , 2009 .

[16]  Milton L. Mueller Networks and States: The Global Politics of Internet Governance , 2010 .

[17]  Patrick D. McDaniel,et al.  A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.

[18]  R. Weber Internet Corporation For Assigned Names And Numbers , 2010 .