Abstract
Authentication is a strong requirement for critical information systems, and Public Key Infrastructure (PKI) is widely used to provide this service. Peer-to-peer PKIs are quite dynamic and certification paths can be built although part of the infrastructure is temporarily unreachable, which is quite common after disasters or network attacks. However, certification path discovery is one of the main drawbacks of peer-to-peer PKIs that strongly affects their scalability. We propose a protocol to build a virtual hierarchical PKI from a peer-to-peer PKI, since certification path construction in hierarchical PKIs is straightforward. Our protocol does not require to issue new certificates, facilitates the certification path discovery process and it is adaptable to the characteristics of users with limited processing and storage capacity. Results show that the execution time of this protocol is short in critical scenarios.
Keywords
- Public Key Infrastructure (PKI)
- hierarchical trust model
- peer-to-peer trust model
- certification path discovery
- critical information systems
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
ITU-T, Recommendation X.509: Information Processing Systems - Open Systems Interconnection - The Directory: Authentication Framework (Technical Corrigendum), International Telecommunication Union (2000)
Housley, R., Polk, W., Ford, W., Solo, D.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2002)
Polk, W.T., Hastings, N.E.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures. NIST (2000)
Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38–43 (1999)
Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: Network and Distributed System Security Symposium (NDSS 2001) (2001)
Marchesini, J., Smith, S.: Virtual Hierarchies - An Architecture for Building and Maintaining Efficient and Resilient Trust Chains. In: 7th Nordic Workshop on Secure IT Systems (NORDSEC 2002), Karlstad (Sweden) (2002)
Pan, H., Li, J., Zhu, Y., Wei, D.: A Practical Scheme of Merging Multiple Public Key Infrastructure in E-commerce. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 1287–1294. Springer, Heidelberg (2005)
Hernandez-Serrano, J., Pegueroles, J., Soriano, M.: GKM over large MANET. In: IEEE International Workshop on Self Assembling Wireless Networks (SAWN 2005), pp. 484–490 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Satizábal, C., Páez, R., Forné, J. (2006). PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_13
Download citation
DOI: https://doi.org/10.1007/11962977_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)
