<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-haiyangjiang-i2bgp-00" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="I2BGP">Desensitize Intra-domain Information for Inter-domain Routing</title>

    <author initials="H." surname="Jiang" fullname="Haiyang Jiang" role="editor">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>jianghaiyang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="P." surname="Cong" fullname="Peizhuang Cong">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <email>congpeizhuang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Wang" fullname="Lei Wang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <email>lwang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Zhang" fullname="Yuchao Zhang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <email>yczhang@bupt.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Wang" fullname="Wendong Wang">
      <organization>Beijing University of Posts and Telecommunications</organization>
      <address>
        <email>wdwang@bupt.edu.cn</email>
      </address>
    </author>

    <date year="2022" month="November" day="17"/>

    <area>General [REPLACE]</area>
    
    <keyword>routing protocol</keyword> <keyword>Internet-Draft</keyword>

    <abstract>


<t>Border Gateway Protocol (BGP) is a routing protocol for autonomous systems 
running on TCP. It is currently the only protocol capable of handling multiple 
connections between unrelated routing domains,such as the size of the Internet.
BGP is built on the experience of EGP.</t>

<t>The main function of BGP system is to exchange network access information 
with other BGP systems. However, it cannot fully utilizethe complete information 
in the domain to achieve the optimal decision.This document proposes I2BGP, 
which describes how to obtain desensitization information in the domain to 
optimize routing decisions.</t>



    </abstract>



  </front>

  <middle>


<section anchor="problems"><name>Introduction</name>

<t>Border Gate way Protocol (BGP) early used to solve the problem of the  
interconnection between a large number of Internet ASs (autonomous systems).
Compared with the traditional dual-IP dual-wire technology, it is more efficient.
At present, the BGP protocol is widely deployed on the Internet,and there are 
many important enhancements to improve BGP performance in terms of refifining 
scheduling granularity, accelerating convergence time, anomalous behavior 
detection and so on.</t>

<t>However,current BGP-like protocols follow the basic principle of taking hops - 
the number of Autonomous Systems (AS) on a path - as the metric for routing: 
the less hops, the higher the priority of the path,such as <xref target="RFC4271"/>. 
Such strategy regards all domains as indiscriminate blackbox and thus can not 
achieve the optimal inter-domain routing decisions due to the lack of 
intra-domain information.</t>

<t>This document proposes I2BGP which developed based on BGP-4.It use a 
Desensitized Intra-domain information-aware Tactic (DIT) to assist inter-domain 
routing decisions, which can be embedded in BGP or applied independently as 
a control-plane strategy. DIT can make use of intra-domain information while 
protecting data privacy at the same time,thus solving the contradiction between 
data sharing and privacy protection.</t>

</section>
<section anchor="conventions"><name>Conventions</name>

<t>DIT:  The frame that the document proposed,which makes near-optimal 
inter-domain routing decisions with desensitized intra-domain information that 
the document proposed</t>

<t>AS/ASes:Autonomous Systems in the internet.</t>

<t>I2BGP: The special protocol which based on BGP and owned the ability 
that extract the message from intra-domain and make the optimal decision</t>

<t>DRT: It represents uppercase mathematical symbol of delta.</t>

<t>drt: It represents lower mathematical symbols of delta.</t>

<t>o: The article uses it for the same OR operation,mainly in the formula of 
encryption and decryption.</t>

<t>o+:The article uses it for the XOR operation,mainly in the formula of encryption 
and decryption.</t>

</section>
<section anchor="requirements-and-use-case-scenario"><name>Requirements 
and Use Case Scenario</name>

<t>This section describes some essential requirements for I2GBP and the scenario 
about the problem hidden in BGP.</t>

<section anchor="requirements"><name>Requirements</name>

<section anchor="supporting-information-export"><name>Supporting 
Information Export</name>

<t>Data within a domain could be exported, mainly referring to the link 
performance status,e.g., delay, bandwidth, packet loss rate, hops, etc. The 
performance of an inter-domain transmission is jointly determined by the link 
performance of all passed domains, then, for different attributes, which can be 
summarized as bottleneck type (bandwidth) and cumulative type (delay, packet 
loss rate, hops), the calculation of combination will be different.In this document, 
I2BGP takes the number of hops as a typical example that ought to be 
calculated by addition.</t>

</section>
<section anchor="privacy-protection-requirement"><name>Privacy Protection 
Requirement</name>

<t>Private information of domains should not be deduced from the exported 
information, because information like hops may involve intra-domain topology, 
which requires that the information cannot be directly disclosed to other ASes.</t>

</section>
</section>
<section anchor="use-case-scenario"><name>Use Case Scenario</name>

<t>BGP cannot use the information in the domain to make routing decisions, 
which often makes the final routing decision not optimal. Take the forwarding 
hops as an example, <xref target="Figure1"/> shows two paths between server 
s and client c:Path A with 4 As hops (s -&gt; a1 -&gt; a2 -&gt; a3 -&gt; c ) and 
Path B with 2 As hops(s -&gt; b -&gt; c ). For client c, Path B will be selected as 
actually routing path according the principle of BGP, and Path A will be discarded. 
But in fact, there are additional hops in each domain, shown as the numbers in 
<xref target="Figure1"/>, which makes path A the real better path.</t>

<t>```</t>

<figure title="Example of BGP-based inter-domain routing" anchor="Figure1">
<artwork><![CDATA[
                        +---+        +---+            +---+
         +---------+ 2 +--------+ 3 +-------+ 2 +------------+
         |              +---+        +---+            +---+                  |
+----+---+       As a1        As a2       As a3                +----+---+
 |Server s  |                                                                | Cilent c  |
+----+---+                        +---+                              +----+---+
        +----------------------+15 +---------------------------+
                                         +---+
                                          As b
]]></artwork></figure>
<t>```</t>

</section>
</section>
<section anchor="overview-of-i2bgp"><name>Overview of I2BGP</name>

<t>This section describes the model of I2BGP and how it exports the 
information from intra-domain without revealing data and make the final route 
decision.The judgment attributes of traditional BGP path selection do not include 
the impact of intra-domain performance.The document introduces an additional 
attribute, Attr, for BGP to accomplish data carrying and spreading.</t>

<t>Due to each domain is a confidential system with complete independence 
and autonomy and BGP runs at border routers of each domain and specifies the 
next hop  when forwarding across domains according to the RFC4271. In order 
to fetch messages from the domain,I2BGP proposes the DIT technique.It masks 
the intra-domain topology and abstract each domain into a characteristic 
topology graph with its border routers exclusively.Because there are direct or 
indirect connections between all border routers (nodes) of a domain,and 
we abstract these connections as edges between nodes.</t>

<t>After taking the information out of the domain, in order to prevent the 
information in the domain from being leaked, DIT proposes a random obfuscation 
technology to ensure data security, which can ensure that information in the 
domain can be obtained while imitating information security issues.Finally, 
we spread the retrieved information to other domains through the new field Attr, 
and obtain the optimal route by comparing this field.</t>

<section anchor="homomorphic-encryption"><name>Homomorphic 
Encryption</name>

<t>This document introduces homomorphic cryptography to export information 
without revealing data, and to ensure the validity of the final calculation results. 
Homomorphic Cryptography provide a potential solution to the contradiction of 
information exportation and privacy , it is a kind of cryptographic technique that 
performs arithmetic operations on the encrypted data and yields a result equivalent 
to the cyphertext result of some computation on the unencrypted original data. 
Its principle can be explained as follow:</t>

<t>De(En(a)oEn(b)) = ao+b,</t>

<t>where En() is the encryption operation, De() is the decryption operation, o and 
o+are correspond to the operations on the plaintext and cyphertext domains, 
respectively. When o+ represents addition, this encryption is an additive 
homomorphic encryption, and when 鈯?represents multiplication, this 
encryption is a multiplicative homomorphic encryption. The encryption 
function that satisfifies both additive homomorphism and multiplicative 
homomorphism properties and can perform any times of additive and 
multiplicative operations is called fully homomorphic encryption.</t>

<t>Homomorphic encryption algorithms usually have high computational 
complexity.I2BGP select a algorithm which encrypt simple numbers 
and satisfy homomorphic additivity to avoid this problem.</t>

</section>
<section anchor="dit-overview"><name>DIT Overview</name>

<t>Firstly,we mask the intra-domain topology and abstract each domain 
into a characteristic topology graphwith its border routers exclusively. 
Because of the reachability between routes within a domain, 
there are direct or indirect connections between all border routers 
(nodes) of a domain,and we abstract these connections as edges 
between nodes.</t>

<t>Assuming intra-domain information is directly embedded in BGP 
header and transmitted to the neighbors. Then, during the route 
convergence process, cumulative calculations (e.g.,addition, 
min() or max()) over multiple domains can inherently protect the 
privacy of all upstream domains data, i.e.,mathematically speaking, on 
the basis of c = a + b, it couldnot infer the values of a and b when 
only c is known. This is one of the foundations for the privacy 
protection in DIT.However, the inherent data privacy protection 
brought by cumulative calculations is effective 
only after at least one such operation has already been conducted. 
In other words, the cumulative calculations can only achieve non-destination 
domain data protection. For example, as shown in the 
<xref target="Figure2"/>, for As 3, the value of As 1or 
As 2 cannot be inferred from the cumulative summation sent from As 2. 
However, As 2 is directly connected to the destination domain of the 
route (As 1), the value of As 1 is directly exposed to As 2 due to the 
lack of protection from cumulative calculation. That is, for the 
destination domain of each route, information leakage 
risk still exists, which is caused by directly connected neighbordomains, 
we name it the Direct Connection issue.</t>

<t>To solve Direct Connection issue, we propose a basicmethod 
named Random Number Confusion. In the path selection process, 
it is only necessary to select the optimal pathby basic comparisons.
Just like giving random offsets to all nodes in 
the coordinate system will not change the relative positions. Therefore, 
for target D, DIT adds a random number to the data in the domain 
when initially spreading the data to the adjacent domain, that is, 
D will export the data in the domain, 
which will not affect the comparison of the final results</t>

<t>After fetching the data,to carry the above intra-domain data, 
we add a new filed,Attr, to the BGP packet header, although 
which is not strictly required because we can also reuse existing 
fields, provided the re-definition of the field 
function is approved. And the quantifified value of the 
destination-based cumulative path performance is embedded 
into this fifield and diffused to neighbor domains 
with the route update message.Then the optimal route is 
obtained by comparing.</t>

<t>```</t>

<figure title="Inter-domain information security scenarios" 
anchor="Figure2">
<artwork><![CDATA[
+--------+    +--------+    +--------+ 
|              |     |              |     |            |  
|  As 1     +--+  As 2    +---+  As 3  |
|              |     |              |     |            |  
+-----+--+   +--+-----+   +--------+   
          |               |
  +---+----------+-+
  |                           |
  |          As 4           |
  |                           |
  +------------------+
]]></artwork></figure>
<t>```</t>

</section>
<section anchor="delta-trap"><name>Delta Trap</name>

<t>While Random Number Confusion solves the destination 
direct connection issue, there is still a trap of information leakage. 
It can be drawed from a mathematical perspective. 
Suppose it is known that x1 + x2 = y1 and x1 + x2 + x3 = y2. 
Even if x1 and x2 are unknown, x3 can also be calculated by 
using the difference value (DRT) between y1 and y2, i.e., x3 = y2 - y1.
As shown in the <xref target="Figure2"/> ,the value of As 3 can be 
obtained using the aforementioned difference value (DRT) method 
by As 4.To solve the problem, the document proposed Enhanced DIT.</t>

</section>
<section anchor="enhanced-dit"><name>Enhanced DIT</name>

<t>Delta Trap (DRT) is triggered by one path has one more 
hop (itself) than the other of same destination.From perspective of 
connection topology, triangular structure is at risk of data leakage.
Based on this, the document design a private number comparison 
algorithm leveraged by homomorphic encryption, which iscapable 
of comparing paths in a triangle topology under guarantee of 
data security. The comparison result could guide the logical 
removal of non-shortest paths. It includes classic homomorphic 
encryption algorithm Paillier and a private number 
comparison algorithm.</t>

<t>Paillier algorithm randomly selecting two large prime to generate  
key.Then it can process the corresponding value by encrypting 
and decrypting. Based on Paillier, the private number comparison 
which is used as an independent module of DIT is patch 
the leakage caused by Delta Trap (DRT).</t>

<t>Private Number Comparison firstly detectes the triangle structures 
from the network topology. Then it will compare paths , comparison 
and path selection would be accomplished by communicating 
with each other As. As shown in <xref target="Figure3"/>,suppose A, 
B and C, each of which is responsible for local values, NA, NB, NC , 
respectively. First,A sends encrypted N<sub>A</sub> by private 
key of A, En<sup>A</sup>(N<sub>A</sub>), to B and C. 
After receiving the message from A, B sends 
En<sup>A</sup>(N<sub>A</sub>)oEn<sup>A</sup>(N<sub>B</sub>) 
to C, where represents homomorphic addition calculation, which means 
En(x)oEn(y) = En(x+y). After receiving the message from A and B, C sends 
En<sup>A</sup>(N<sub>A</sub> +N<sub>B</sub>) En<sup>A</sup>((drt)<sub>C</sub> ) 
and En<sup>A</sup>(N<sub>A</sub>)oEn<sub>A</sub>(N<sub>C</sub> + (drt)<sub>C</sub> ) 
to A in the specifified order. After receiving the message from C, A decrypts and 
subtracts the two values,De<sup>A</sup>.
(En<sub>A</sub>(N<sub>A</sub> + N<sub>B</sub> + (drt)<sub>C</sub> )) - De<sup>A</sup>(En<sup>A</sup>(N<sub>A</sub> + N<sub>C</sub> + (drt)<sub>C</sub> )), 
and get the signed delta value (drt)<sub>C</sub> , which will be sent back 
to C. Finally, according to DRT<sub>C</sub> , C and A can determine 
the priority of the two paths, Path(C-&gt;A) and Path(C-&gt;B-&gt;A) .</t>

<t>```</t>

<figure title="Comparison example: communication and computation process 
of homomorphic encryption-based private number comparison" 
anchor="Figure3">
<artwork><![CDATA[
                               +--------------------+
                                |                              |
                                |      a=En(Na)          |
            +------------+                             +---------+
             |                  |(dtl)c=De(c1)-De(c2)|               |
             |                  |                               |               |(1)a
       (1)a|                 +---------Na---------+              |(3)c1,c2
             |                                                                   |(4)(dlt)c
    +-------+---------+                         +--------+--------------+                      
    |                           |                          |   c1=aoEn(Nc+(dlt)c)   |
    |      b=aoEn(Nb)  +-----------------+                                   |
    |                            |              (2)b     |           c2=boEn((dlt)c)  | 
    +-------Nb--------+                       +---------Nc-------------+                                                            
]]></artwork></figure>
<t>```</t>

</section>
</section>
<section anchor="manageability-considerations"><name>Manageability 
Considerations</name>

<t>I2BGP introduces a new field Attr based on BGP to obtain the message 
of link in domain. The transmission and use of this field is similar to med 
and local-pref in the BGP header.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There are no IANA considerations related to this document.</t>

</section>
<section anchor="security-considerations"><name>Security 
Considerations</name>

<t>Due to I2BGP is based on BGP,I2BGP faces the following security risks 
like BGP:</t>

<t>1.TCP/IP protocol vulnerabilities: I2BGP runs on top of TCP, and no 
special encryption and authentication mechanisms are designed. All attacks 
against TCP/IP vulnerabilities can cause harm to the operation of I2BGP.</t>

<t>2.Communication mechanism loopholes: There are many loopholes in 
the operation mechanism of I2BGP itself. If an external attacker 
maliciously modifies the message content and the order of sending 
messages, the I2BGP peers will not be able to exchange routing 
information normally through BGP.</t>

<t>3.Information verification vulnerability: I2BGP does not have a 
corresponding mechanism to ensure the authenticity of router routing 
information. If a router announces false, wrong or suboptimal routing 
information to its neighbors, the existing mechanism cannot identify it.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Acknowledgements to Yuchao Zhang,Peizhuang Cong,Haiyang Jiang,
Lei Wang,Wendong Wang,Xiangyang Gong,Dan Li for their review and 
contributions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC4271' target='https://www.rfc-editor.org/info/rfc4271'>
<front>
<title>A Border Gateway Protocol 4 (BGP-4)</title>
<author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'><organization/></author>
<author fullname='T. Li' initials='T.' role='editor' surname='Li'><organization/></author>
<author fullname='S. Hares' initials='S.' role='editor' surname='Hares'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document discusses the Border Gateway Protocol (BGP), 
which is an inter-Autonomous System routing protocol.</t><t>The primary 
function of a BGP speaking system is to exchange network reachability 
information with other BGP systems.  This network reachability information 
includes information on the list of Autonomous Systems (ASes) that reachability 
information traverses. This information is sufficient for constructing a graph of AS 
connectivity for this reachability from which routing loops may be pruned, and, at 
the AS level, some policy decisions may be enforced.</t><t>BGP-4 provides a set 
of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These 
mechanisms include support for advertising a set of destinations as an IP prefix, 
and eliminating the concept of network &quot;class&quot; within BGP.  BGP-4 also 
introduces mechanisms that allow aggregation of routes, including aggregation of 
AS paths.</t><t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4271'/>
<seriesInfo name='DOI' value='10.17487/RFC4271'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

