DOI QR코드

DOI QR Code

IPv4 Address Trading Using Resource Certificate

  • Published : 2010.03.31

Abstract

The Internet has been growing at unprecedented rates. The problem of an address shortage could act as a barrier on this growth. In principle, a new Internet standard, IPv6 solves the problem of the address shortage because it has a very large address space. But IPv6 is not yet compatible with the IPv4 and during the IPv4-to-IPv6 transition period IPv4 address will continue to be in demand. Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading. This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.

Keywords

References

  1. Milton Muller, "Scarcity in IP addresses: IPv4 Address Transfer Markets and the Regional Internet Address Registries," Internet Governance Project, 20 Jul., 2008.
  2. M. Lepinski, S. Kent, "An Infrastructure to Support Secure Internet Routing (draft-ieth-sidr-arch- 09.txt)," IETF sidr WG draft, 2009. 10.
  3. Michaelson, G., Kent, S., and Huston, G., "A Profile for Trust Anchor Material for the Resource Certificate PKI," draft-ietf-sidr-ta-02, September, 2009.
  4. S. Murphy, "RFC:4272 BGP Security Vulnerabilities Analysis," IETF, 2006. 1.
  5. S.M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," Computer Communication Review, Vol.10, No.2, 1989. 4. https://doi.org/10.1145/378444.378449
  6. Nordstrom, C. Dovrolis, "Beware of BGP Attacks," ACM SIGCOMM Computer Communications Review, Vol.34, No.2., 2004. 4. https://doi.org/10.1145/997150.997152
  7. Hawkinson, J., Bates, T., "RFC1930: Guidelines for creation, selection, and registration of an autonomous syste (AS)," IETF, 1996.
  8. Stewart, J., "BGP4: Inter-Domain Routing in the Internet," Addison-Wesley, 1999.
  9. Z. Zhang, Y. Zhang, C. Hu, Z. M. Mao, "Practical Defenses Against BGP Prefix Hijacking," Proceeding of ACM CoNEXT, 2007. 12. https://doi.org/10.1145/1364654.1364658
  10. D. Wendlandt, I. Avramopoulos, D. Andersenm J. Rexford, "Don't Secure Routing Protocols, Secure Data Delivery," Proceeding of ACM HotNets, 2006. 11.
  11. S. Kent, C. Lynn, K. Seo, "Secure Border Gateway Protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications (JSAC), Vol.18, No.4, 2000. 4. https://doi.org/10.1109/49.839934