Skip to main content

PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 4347)

Abstract

Authentication is a strong requirement for critical information systems, and Public Key Infrastructure (PKI) is widely used to provide this service. Peer-to-peer PKIs are quite dynamic and certification paths can be built although part of the infrastructure is temporarily unreachable, which is quite common after disasters or network attacks. However, certification path discovery is one of the main drawbacks of peer-to-peer PKIs that strongly affects their scalability. We propose a protocol to build a virtual hierarchical PKI from a peer-to-peer PKI, since certification path construction in hierarchical PKIs is straightforward. Our protocol does not require to issue new certificates, facilitates the certification path discovery process and it is adaptable to the characteristics of users with limited processing and storage capacity. Results show that the execution time of this protocol is short in critical scenarios.

Keywords

  • Public Key Infrastructure (PKI)
  • hierarchical trust model
  • peer-to-peer trust model
  • certification path discovery
  • critical information systems

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ITU-T, Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)

    Google Scholar 

  2. Housley, R., Polk, W., Ford, W., Solo, D.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2002)

    Google Scholar 

  3. Polk, W.T., Hastings, N.E.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures. NIST (2000)

    Google Scholar 

  4. Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38–43 (1999)

    CrossRef  Google Scholar 

  5. Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: Network and Distributed System Security Symposium (NDSS 2001) (2001)

    Google Scholar 

  6. Marchesini, J., Smith, S.: Virtual Hierarchies - An Architecture for Building and Maintaining Efficient and Resilient Trust Chains. In: 7th Nordic Workshop on Secure IT Systems (NORDSEC 2002), Karlstad (Sweden) (2002)

    Google Scholar 

  7. Pan, H., Li, J., Zhu, Y., Wei, D.: A Practical Scheme of Merging Multiple Public Key Infrastructure in E-commerce. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 1287–1294. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  8. Hernandez-Serrano, J., Pegueroles, J., Soriano, M.: GKM over large MANET. In: IEEE International Workshop on Self Assembling Wireless Networks (SAWN 2005), pp. 484–490 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Satizábal, C., Páez, R., Forné, J. (2006). PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_13

Download citation

  • DOI: https://doi.org/10.1007/11962977_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics