FIXING THE INTERNET ROUTING SYSTEM
The Internet comprises more than 75,000 interconnected networks which exchange data such as pictures, videos, calls, financial and personal information. These networks are connected to each other using routers that dynamically build a map of the Internet using Border Gateway Protocol (or BGP), allowing traffic to be forwarded from router-to-router to its final destination, typically using the most optimal path through the Internet.
More
BGP was originally designed in the 1980s when security was not a significant consideration as the smaller number of participating networks could be expected to cooperate to keep the network in good health. The Internet is therefore inherently based on unverified trust between networks – namely that a network (known as an Autonomous System or AS) will only advertise IP prefixes (or routes) that it legitimately holds, will only announce routes to other ASes that it can actually reach, and will only send packets with the correct source IP addresses.
Another problem with BGP is that it typically selects routes based on the fewest number of logical hops to a destination and doesn’t consider other factors such as physical distances, congested links or geopolitical considerations which can be an issue for reliable data transmission and ensuring data security. When there is a change in the reachability of one or more networks, BGP also needs to recalculate how to send data across the Internet and this so-called convergence can take several minutes which can cause delays and/or cause data to be lost.
Unfortunately, this means the Internet can no longer meet the security and reliability needs of many organizations and users, particularly those in the finance, healthcare, utilities, and public sector, as well as operators of critical infrastructures.
INTERNET ROUTING ISSUES
Gaps in routing security
More
This can variously lead to service disruption, traffic interception, redirection or modification, and large-scale Distributed Denial-of-Service (DDoS) attacks which all pose significant and substantial security risks to enterprises, governments and end users. In particular, activists and criminals have increasingly targeted the routing system to steal data and cause disruption, whilst state-level actors have also manipulated it to impose censorship, undertake espionage and/or conduct cyberwarfare.
Whilst RPKI (Resource Public Key Infrastructure) is being deployed to allow the ownership of networks to be cryptographically verified, it requires widespread deployment to be effective and less than 50% of the nearly one million IP prefixes (as of 2024) currently have valid Route Origin Authorizations (ROAs). Even fewer networks (around 5%) are currently checking ROAs using Route Origin Validation (ROV), and even this only checks the details of the destination network and does not validate paths through the Internet. Moreover, the RPKI system is provisioned by third parties – albeit Regional Internet Registries (RIRs) who are authoritative and generally reliable – which can contain errors and/or be subject to hacking.
Lack of path selection, control & validation
More
Challenges in enforcing data sovereignty
More
SCION, built on trust for today’s needs
Security
In today’s Internet, users need to be able to trust the networks to whom they are sending their data, and the networks through which their data passes. SCION has been designed with security considerations at the forefront by introducing the concept of trusted networks and domains combined with robust verification to address the existing issues with how data is sent over the Internet.
Reliability
SCION can use existing Internet infrastructure, but offers fast multi-path discovery and path selection. Users can select how their data is sent to other SCION networks as applications are able to choose paths based on optimal characteristics or other parameters. Applications can also very quickly switch (within 1 or 2 seconds) to alternative paths in the event of link failure, congestion or denial-of-service attacks, thereby providing higher levels of assurance of availability and reliability.
SCION advantages
Trusted networks for reduced attack surface
Path validation against route leaks, hijacks and spoofing
Path control and geofencing for data sovereignty
Multi-path and fast fail-over for network uptime
Scalable and interoperable for easy of deployment
SCION is based on Internet protocols and can utilize existing Internet infrastructure. No change is needed to the internal network infrastructure of a network operator, and devices that are not SCION enabled can utilize SCION gateways.
The aim is to have the SCION technology recognised as an IETF standard, and several Internet Drafts describing the various aspects have been published and are currently progressing through the IETF with a view to being published as RFCs.
SCION FEATURES: HOW SCION WORKS
SCION addresses many of the existing issues with how data is sent over the Internet, including those relating to inter-domain routing security and path selection. It introduces the concept of trusted networks and domains, and supports fast multi-path discovery and failover between participating networks.
Trust model based on Isolation Domains (ISDs)
The SCION trust model is based around Isolation Domains (ISDs) that are logical groupings of participating networks (ASes) sharing a uniform trust environment – namely a common jurisdiction with agreed trust policies. Each ISD is administered by one or more core ASes who collectively generate a trust root called the Trust Root Configuration (a collection of X.509 certificates with ISD information). This is used to establish a standalone CA (i.e. one that is not reliant on third-party CAs) to issue certificates to each AS in the ISD, which can then be validated by the SCION Control Plane. It allows operators and users to establish and manage their own trust criteria and choose with whom to send, receive and transit traffic.
Control plane
SCION utilizes a beaconing mechanism to discover path segments between ASes, which are then assembled into available routing paths that are cryptographically validated using the certificates issued to each AS in an ISD. It is necessary for each ASN in an ISD to run control plane services that include beaconing, path mapping and certificate/key management, and are typically provided by dedicated hardware or run in a Docker container.
By grouping ASes into ISDs, this also isolates their control planes and reduces communications overhead with the rest of the Internet. In addition, only explicitly allowed traffic is exchanged between ISDs.
Routing
SCION sends data from network-to-network using simplified routers that are set-up on the borders of an AS, without changes being needed to the internal structure of that AS. These SCION-enabled routers peer with other SCION-enabled routers to forward and receive customer traffic and do not need to undertake control plane operations which are handled by the control services for each ISD. Endpoints can either run a SCION-aware stack or alternatively utilize a SCION gateway.
Download technical resources
SCION Technical overview
Technical document
The Complete Guide to SCION
Book
SCION drafts at IETF
Publication
Frequently asked questions
How can SCION be deployed on the Internet?
SCION can be incrementally deployed at ISPs, who can make use of SCION’s features to route traffic through the backbone of the Internet. This is done by (transparently to end-users) encapsulating SCION packets inside IP packets. At the edges, encapsulation is removed and SCION packets are routed as usual. If a SCION path exists between two or more SCION-enabled ISPs, encapsulation is not needed.
Which ports does SCION run on?
The SCION protocol can be encapsulated on top of UDP. For more details, see the developer docs: https://docs.scion.org/en/latest/manuals/router.html#port-table.
What is the operating system that SCION runs on?
Why use ISDs? Shouldn't the Internet be a globally-connected entity?
Is SCION a source-routed architecture? What are differences with segment routing?
Does SCION need flow state to be set up on intermediate routers before communication can occur?
How is SCION overcoming configuration errors? Is this simply an artifact of the isolation property (one AS's errors don't impact others) or the reduction in configuration complexity?
How is SCION's multi-path routing concealing link failures from applications? A loss of some packets on a path will still introduce delays and retransmissions.
Does SCION work for hosts behind NATs?
How does SCION Interoperate with the existing Internet?
Does SCION replace existing Internet protocols?
Does SCION support IPv6?
What network layer(s) does SCION operate at?
What hardware and software is needed to run SCION?
SCION routing does not require specialized hardware, therefore it runs on commercial off-the shelf hardware or in virtualized platforms.
Is SCION standardized?
There is ongoing work at the IETF and at the Association’s Standardization Committee.
WE’RE HAPPY TO SHARE OUR INSIGHTS AT INDUSTRY EVENTS
If you’re interested in having us present SCION, don’t hesitate to reach out to us.