Frontiers of Data and Domputing ›› 2022, Vol. 4 ›› Issue (3): 90-109.

CSTR: 32002.14.jfdc.CN10-1649/TP.2022.03.007

doi: 10.11871/jfdc.issn.2096-742X.2022.03.007

• Technology and Application • Previous Articles     Next Articles

A Revocation Detection Mechanism in RPKI Based on Behavior Transparency

ZOU Hui1,2,3,*(),LI Yanbiao1,2(),YU Chenhui1,2(),MA Di1,3(),MAO Wei1,3()   

  1. 1. Computer Network Information Center, Chinese Academy of Sciences, Beijing 100083, China
    2. University of Chinese Academy of Sciences, Beijing 100049, China
    3. ZDNS, Beijing 100190, China
  • Received:2021-10-20 Online:2022-06-20 Published:2022-06-20
  • Contact: ZOU Hui;;;


[Objective] In response to the issue of resource failure caused by the unilateral revocation in the current Resource Public Key Infrastructure (RPKI), this paper proposes a novel scheme based on Behavior Transparency (BT) to detect unilateral revocations, and demonstrates its effect and performance via extensive experiments. [Methods] This paper first analyzes in detail the issue of unilateral revocation, as well as the risk of resource failures resulting from it, and then proposes to monitor and handle unilateral revocations with the help of a log server that records issuance behaviors of CAs. [Results] According to the experimental results, the efficiency of the proposed scheme satisfies the performance demand posed by the current RPKI system, and its accuracy in detecting unilateral revocations can reach 100% as long as a credible and fully controllable log server is deployed. Moreover, additional transmission overhead resulting from communicating with the log server is negligible. [Limitations] The accuracy, performance, and scalability of the proposed scheme need to be further evaluated in large-scale RPKI systems to verify its value in case that RPKI is fully or near-fully deployed in the future. [Conclusions] In the current RPKI systems, the proposed scheme can effectively detect unilateral revocations with negligible overhead, enabling CAs to monitor the effectiveness of their resources and the revocations to the issuances.

Key words: IP address, AS number, secure inter-domain routing, resource public key infrastructure, transparency